CVE-2026-23086
Memory Exhaustion via Unbounded TX Credit in Linux virtio-vsock
Publication date: 2026-02-04
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.68 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.8 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 4.8 (inc) to 6.1.162 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's virtio transport for vsock, where the transmit (TX) credit is derived directly from a buffer size value controlled by the remote endpoint (peer_buf_alloc). This means a malicious guest can advertise a very large buffer size and read data slowly, causing the host to allocate an excessive amount of kernel memory (sk_buff), potentially leading to resource exhaustion.
The issue arises because the host scales the amount of data it queues for a connection based on the guest's advertised buffer size rather than its own configuration, allowing the guest to force the host to use more memory than intended.
The fix introduces a helper function that limits the TX buffer size to the minimum of the peer's advertised buffer and the local buffer allocation, ensuring that neither side can force the other to queue more data than allowed by its own settings.
How can this vulnerability impact me? :
This vulnerability can lead to excessive memory consumption on the host system when a malicious guest advertises large buffer sizes and reads data slowly. This can cause the host's kernel memory usage to spike dramatically, potentially leading to system instability or the need to kill processes to recover memory.
In practical terms, an unpatched system with sufficient RAM could see slab memory usage increase from hundreds of megabytes to tens of gigabytes, which may degrade performance or cause out-of-memory conditions.
However, with the patch applied, memory usage remains stable even under attack conditions, preventing host out-of-memory scenarios and keeping the guest responsive.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
This vulnerability has been resolved by a patch that limits the TX credit to the minimum of the peer's advertised buffer and the local buffer allocation, preventing a remote peer from forcing excessive memory allocation.
To mitigate this vulnerability immediately, ensure your Linux kernel is updated with the patch that introduces the virtio_transport_tx_buf_size() helper function, which bounds the effective TX window.
If you are running virtual machines using virtio-vsock or vhost-vsock, update your host system to a kernel version that includes this fix.
Additionally, consider limiting QEMU memory usage with cgroups to reduce the impact of potential exploitation.