Описание
In the Linux kernel, the following vulnerability has been resolved:
gve: Fix stats report corruption on queue count change
The driver and the NIC share a region in memory for stats reporting. The NIC calculates its offset into this region based on the total size of the stats region and the size of the NIC's stats.
When the number of queues is changed, the driver's stats region is resized. If the queue count is increased, the NIC can write past the end of the allocated stats region, causing memory corruption. If the queue count is decreased, there is a gap between the driver and NIC stats, leading to incorrect stats reporting.
This change fixes the issue by allocating stats region with maximum size, and the offset calculation for NIC stats is changed to match with the calculation of the NIC.
In the Linux kernel, the following vulnerability has been resolved:
gve: Fix stats report corruption on queue count change
The driver and the NIC share a region in memory for stats reporting. The NIC calculates its offset into this region based on the total size of the stats region and the size of the NIC's stats.
When the number of queues is changed, the driver's stats region is resized. If the queue count is increased, the NIC can write past the end of the allocated stats region, causing memory corruption. If the queue count is decreased, there is a gap between the driver and NIC stats, leading to incorrect stats reporting.
This change fixes the issue by allocating stats region with maximum size, and the offset calculation for NIC stats is changed to match with the calculation of the NIC.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2026-23262
- https://git.kernel.org/stable/c/11f8311f69e4c361717371b4901ff92daeb76e9c
- https://git.kernel.org/stable/c/7b9ebcce0296e104a0d82a6b09d68564806158ff
- https://git.kernel.org/stable/c/837c662f47dac43efa1aef2dd433c6b4b4c073af
- https://git.kernel.org/stable/c/9d93332397405b62a3300b22d04ac65d990b91ff
- https://git.kernel.org/stable/c/9fa0a755db3e1945fe00f73fe27d85ef6c8818b7
- https://git.kernel.org/stable/c/df54838ab61826ecc1a562ffa5e280c3ab7289a7
- https://git.kernel.org/stable/c/f432f7613c220db32c2c6942420daf7b3f2e7d7e
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: gve: Fix stats report corruption on queue count change The driver and the NIC share a region in memory for stats reporting. The NIC calculates its offset into this region based on the total size of the stats region and the size of the NIC's stats. When the number of queues is changed, the driver's stats region is resized. If the queue count is increased, the NIC can write past the end of the allocated stats region, causing memory corruption. If the queue count is decreased, there is a gap between the driver and NIC stats, leading to incorrect stats reporting. This change fixes the issue by allocating stats region with maximum size, and the offset calculation for NIC stats is changed to match with the calculation of the NIC.
A memory corruption vulnerability was found in the Linux kernel's Google Virtual Ethernet (gve) driver. The driver and NIC share a memory region for statistics reporting, with the NIC calculating its write offset based on the region size. When queue count is increased, the driver resizes the stats region, but the NIC continues using the old offset calculation, causing out-of-bounds writes past the allocated buffer and corrupting kernel memory.
In the Linux kernel, the following vulnerability has been resolved: gve: Fix stats report corruption on queue count change The driver and the NIC share a region in memory for stats reporting. The NIC calculates its offset into this region based on the total size of the stats region and the size of the NIC's stats. When the number of queues is changed, the driver's stats region is resized. If the queue count is increased, the NIC can write past the end of the allocated stats region, causing memory corruption. If the queue count is decreased, there is a gap between the driver and NIC stats, leading to incorrect stats reporting. This change fixes the issue by allocating stats region with maximum size, and the offset calculation for NIC stats is changed to match with the calculation of the NIC.
In the Linux kernel, the following vulnerability has been resolved: g ...
Уязвимость модулей drivers/net/ethernet/google/gve/gve_ethtool.c и drivers/net/ethernet/google/gve/gve_main.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS