Description
In the Linux kernel, the following vulnerability has been resolved:

net: hv_netvsc: reject RSS hash key programming without RX indirection table

RSS configuration requires a valid RX indirection table. When the device
reports a single receive queue, rndis_filter_device_add() does not
allocate an indirection table, accepting RSS hash key updates in this
state leads to a hang.

Fix this by gating netvsc_set_rxfh() on ndc->rx_table_sz and return
-EOPNOTSUPP when the table is absent. This aligns set_rxfh with the device
capabilities and prevents incorrect behavior.
Published: 2026-02-04
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (Kernel Hang)
Action: Immediate Patch
AI Analysis

Impact

The Linux kernel's hv_netvsc network driver accepts RSS hash key configuration updates without verifying the existence of an RX indirection table when the device reports only a single receive queue. This oversight can cause the kernel to hang, leading to an outage of the operating system or services running on it. The flaw does not enable arbitrary code execution but effectively disrupts system availability.

Affected Systems

All Linux kernels that ship the unpatched hv_netvsc driver are affected. The issue applies to any distribution or virtual machine environment using the Hyper‑V network virtualization stack. No specific distribution or kernel version is listed, so administrators should verify whether their current kernel contains the patch before relying on the potential impact.

Risk and Exploitability

The CVSS base score of 7.0 indicates a high impact, while the EPSS probability of less than 1% and absence from the CISA KEV catalog show a low likelihood of active exploitation. Attackers would need to send an RSS hash key update to the virtual NIC, which typically requires network or administrative access. If triggered, the kernel hang leads to a denial of service that can be mitigated by applying the vendor patch or disabling RSS programming for devices lacking an indirection table.

Generated by OpenCVE AI on April 17, 2026 at 23:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest kernel update that contains the fix for CVE-2026-23054.
  • If a patch is not yet available, configure the hypervisor or virtual NIC settings to prevent RSS hash key updates when the device reports a single receive queue.
  • Monitor system logs for kernel hang events or errors that might indicate an attempt to exploit the driver, and investigate any suspicious activity promptly.

Generated by OpenCVE AI on April 17, 2026 at 23:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4476-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6126-1 linux security update
Debian DSA Debian DSA DSA-6127-1 linux security update
History

Sat, 18 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-704

Fri, 06 Feb 2026 16:45:00 +0000


Thu, 05 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Low


Wed, 04 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: hv_netvsc: reject RSS hash key programming without RX indirection table RSS configuration requires a valid RX indirection table. When the device reports a single receive queue, rndis_filter_device_add() does not allocate an indirection table, accepting RSS hash key updates in this state leads to a hang. Fix this by gating netvsc_set_rxfh() on ndc->rx_table_sz and return -EOPNOTSUPP when the table is absent. This aligns set_rxfh with the device capabilities and prevents incorrect behavior.
Title net: hv_netvsc: reject RSS hash key programming without RX indirection table
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-02-09T08:37:52.262Z

Reserved: 2026-01-13T15:37:45.951Z

Link: CVE-2026-23054

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-02-04T17:16:16.070

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-23054

cve-icon Redhat

Severity : Low

Publid Date: 2026-02-04T00:00:00Z

Links: CVE-2026-23054 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:45:25Z

Weaknesses