In the Linux kernel, the following vulnerability has been resolved: 9p/net: fix improper handling of bogus negative read/write replies In p9_client_write() and p9_client_read_once(), if the server incorrectly replies with success but a negative write/read count then we would consider written (negative) <= rsize (positive) because both variables were signed. Make variables unsigned to avoid this problem. The reproducer linked below now fails with the following error instead of a null pointer deref: 9pnet: bogus RWRITE count (4294967295 > 3)
2025-05-09T07:16:09.143
2025-11-12T19:53:46.030
Analyzed
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSSv3.1: 7.1 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | linux | linux_kernel | < 6.1.136 | Yes |
| Operating System | linux | linux_kernel | < 6.6.89 | Yes |
| Operating System | linux | linux_kernel | < 6.12.26 | Yes |
| Operating System | linux | linux_kernel | < 6.14.5 | Yes |
| Operating System | debian | debian_linux | 11.0 | Yes |