-
CVE-2026-23069
- EPSS -
- Veröffentlicht 04.02.2026 16:07:49
- Zuletzt bearbeitet 04.02.2026 17:16:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: fix potential underflow in virtio_transport_get_credit() The credit calculation in virtio_transport_get_credit() uses unsigned arithmetic: ret = vvs->peer_buf_alloc - (vvs->tx_cnt - vvs->peer_fwd_cnt); If the peer shrinks its advertised buffer (peer_buf_alloc) while bytes are in flight, the subtraction can underflow and produce a large positive value, potentially allowing more data to be queued than the peer can handle. Reuse virtio_transport_has_space() which already handles this case and add a comment to make it clear why we are doing that. [Stefano: use virtio_transport_has_space() instead of duplicating the code] [Stefano: tweak the commit message]
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
02f9af192b98d15883c70dd41ac76d1b0217c899
Version
06a8fc78367d070720af960dcecec917d3ae5f3b
Status
affected
Version <
d05bc313788f0684b27f0f5b60c52a844669b542
Version
06a8fc78367d070720af960dcecec917d3ae5f3b
Status
affected
Version <
ec0f1b3da8061be3173d1c39faaf9504f91942c3
Version
06a8fc78367d070720af960dcecec917d3ae5f3b
Status
affected
Version <
3ef3d52a1a9860d094395c7a3e593f3aa26ff012
Version
06a8fc78367d070720af960dcecec917d3ae5f3b
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.8
Status
affected
Version <
4.8
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.122
Status
unaffected
Version <=
6.12.*
Version
6.12.68
Status
unaffected
Version <=
6.18.*
Version
6.18.8
Status
unaffected
Version <=
*
Version
6.19-rc7
Status
unaffected