Impact
A bug in the Linux kernel’s virtio_net driver caused a misalignment between a flexible‑array member and a following fixed‑size array inside the struct virtnet_info. This misplacement shifted the RSS hash key sent to the virtio device by one byte, resulting in a truncated final byte and an uninitialized leading byte. The altered key can lead to incorrect packet hashes, which may mis‑route traffic or degrade network performance, but does not grant code execution or other privilege escalations.
Affected Systems
Linux kernel builds before the commit introducing the TRAILING_OVERLAP helper are affected. This includes the 6.19 release candidates rc1 through rc5 and any downstream releases based on those revisions that have not incorporated the fix. Distributions shipping these kernels without the patch remain vulnerable.
Risk and Exploitability
The CVSS score of 5.5 rates the vulnerability as medium impact. The EPSS score is below 1 % and it is not listed in CISA KEV, indicating a low likelihood of widespread exploitation. Exploitation would require local or privileged access to reconfigure RSS settings on a virtio device and does not provide remote code execution. Overall risk is moderate and best practice is to apply the kernel patch as soon as feasible.
OpenCVE Enrichment