{"id":"CVE-2026-23069","summary":"vsock/virtio: fix potential underflow in virtio_transport_get_credit()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: fix potential underflow in virtio_transport_get_credit()\n\nThe credit calculation in virtio_transport_get_credit() uses unsigned\narithmetic:\n\n  ret = vvs-\u003epeer_buf_alloc - (vvs-\u003etx_cnt - vvs-\u003epeer_fwd_cnt);\n\nIf the peer shrinks its advertised buffer (peer_buf_alloc) while bytes\nare in flight, the subtraction can underflow and produce a large\npositive value, potentially allowing more data to be queued than the\npeer can handle.\n\nReuse virtio_transport_has_space() which already handles this case and\nadd a comment to make it clear why we are doing that.\n\n[Stefano: use virtio_transport_has_space() instead of duplicating the code]\n[Stefano: tweak the commit message]","modified":"2026-04-18T18:29:45.276754138Z","published":"2026-02-04T16:07:49.911Z","related":["SUSE-SU-2026:0962-1","SUSE-SU-2026:1078-1","SUSE-SU-2026:1081-1","SUSE-SU-2026:20838-1","SUSE-SU-2026:20931-1","SUSE-SU-2026:21114-1","SUSE-SU-2026:21123-1","openSUSE-SU-2026:20416-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23069.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/02f9af192b98d15883c70dd41ac76d1b0217c899"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3ef3d52a1a9860d094395c7a3e593f3aa26ff012"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d05bc313788f0684b27f0f5b60c52a844669b542"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d96de882d6b99955604669d962ae14e94b66a551"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ec0f1b3da8061be3173d1c39faaf9504f91942c3"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23069.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23069"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"06a8fc78367d070720af960dcecec917d3ae5f3b"},{"fixed":"d96de882d6b99955604669d962ae14e94b66a551"},{"fixed":"02f9af192b98d15883c70dd41ac76d1b0217c899"},{"fixed":"d05bc313788f0684b27f0f5b60c52a844669b542"},{"fixed":"ec0f1b3da8061be3173d1c39faaf9504f91942c3"},{"fixed":"3ef3d52a1a9860d094395c7a3e593f3aa26ff012"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23069.json"}}],"schema_version":"1.7.5"}