-
CVE-2026-23054
- EPSS -
- Veröffentlicht 04.02.2026 16:04:23
- Zuletzt bearbeitet 04.02.2026 17:16:16
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: net: hv_netvsc: reject RSS hash key programming without RX indirection table RSS configuration requires a valid RX indirection table. When the device reports a single receive queue, rndis_filter_device_add() does not allocate an indirection table, accepting RSS hash key updates in this state leads to a hang. Fix this by gating netvsc_set_rxfh() on ndc->rx_table_sz and return -EOPNOTSUPP when the table is absent. This aligns set_rxfh with the device capabilities and prevents incorrect behavior.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
82c9039c8ebb715753a40434df714f865a3aec9c
Version
962f3fee83a4ef9010ae84dc43ae7aecb572e2a9
Status
affected
Version <
4cd55c609e85ae2313248ef1a33619a3eef44a16
Version
962f3fee83a4ef9010ae84dc43ae7aecb572e2a9
Status
affected
Version <
11dd9a9ef4dc4507a15a69b8511a0013c6c28fa3
Version
962f3fee83a4ef9010ae84dc43ae7aecb572e2a9
Status
affected
Version <
d23564955811da493f34412d7de60fa268c8cb50
Version
962f3fee83a4ef9010ae84dc43ae7aecb572e2a9
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.11
Status
affected
Version <
4.11
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.122
Status
unaffected
Version <=
6.12.*
Version
6.12.67
Status
unaffected
Version <=
6.18.*
Version
6.18.7
Status
unaffected
Version <=
*
Version
6.19-rc6
Status
unaffected