{"id":"CVE-2026-23262","summary":"gve: Fix stats report corruption on queue count change","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ngve: Fix stats report corruption on queue count change\n\nThe driver and the NIC share a region in memory for stats reporting.\nThe NIC calculates its offset into this region based on the total size\nof the stats region and the size of the NIC's stats.\n\nWhen the number of queues is changed, the driver's stats region is\nresized. If the queue count is increased, the NIC can write past\nthe end of the allocated stats region, causing memory corruption.\nIf the queue count is decreased, there is a gap between the driver\nand NIC stats, leading to incorrect stats reporting.\n\nThis change fixes the issue by allocating stats region with maximum\nsize, and the offset calculation for NIC stats is changed to match\nwith the calculation of the NIC.","modified":"2026-04-02T13:12:19.228100Z","published":"2026-03-18T17:41:08.380Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23262.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/11f8311f69e4c361717371b4901ff92daeb76e9c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7b9ebcce0296e104a0d82a6b09d68564806158ff"},{"type":"WEB","url":"https://git.kernel.org/stable/c/837c662f47dac43efa1aef2dd433c6b4b4c073af"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9d93332397405b62a3300b22d04ac65d990b91ff"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9fa0a755db3e1945fe00f73fe27d85ef6c8818b7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/df54838ab61826ecc1a562ffa5e280c3ab7289a7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f432f7613c220db32c2c6942420daf7b3f2e7d7e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23262.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23262"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"24aeb56f2d38edf1b324bdb4f8bc6faf9f0f540c"},{"fixed":"f432f7613c220db32c2c6942420daf7b3f2e7d7e"},{"fixed":"9d93332397405b62a3300b22d04ac65d990b91ff"},{"fixed":"837c662f47dac43efa1aef2dd433c6b4b4c073af"},{"fixed":"df54838ab61826ecc1a562ffa5e280c3ab7289a7"},{"fixed":"9fa0a755db3e1945fe00f73fe27d85ef6c8818b7"},{"fixed":"11f8311f69e4c361717371b4901ff92daeb76e9c"},{"fixed":"7b9ebcce0296e104a0d82a6b09d68564806158ff"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23262.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.10.0"},{"fixed":"5.10.250"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.200"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.124"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.70"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23262.json"}}],"schema_version":"1.7.5"}