CVE-2026-23143
Memory Misalignment Bug in Linux virtio_net Causes RSS Key Corruption
Publication date: 2026-02-14
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.15 (inc) to 6.18.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a misalignment bug in the Linux kernel's virtio_net driver, specifically in the struct virtnet_info. The issue arises because two members within the structure, rss_trailer.hash_key_data and rss_hash_key_data, are misaligned by one byte due to tail padding in a flexible array member.
This misalignment causes the RSS (Receive Side Scaling) key passed to the device to be shifted by one byte, resulting in the last byte being cut off and an uninitialized byte being added at the beginning.
The fix involves using a new helper called TRAILING_OVERLAP() to create a union that overlays the flexible array member and the following members, ensuring proper alignment and preventing this byte shift.
How can this vulnerability impact me? :
The misalignment bug causes the RSS key used by the network device to be incorrectly shifted by one byte. This means the last byte of the key is lost and an uninitialized byte is added at the start.
This could lead to incorrect or unpredictable behavior in network packet processing, potentially affecting network performance or reliability.
However, the description does not specify any direct security impact such as data leakage or privilege escalation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know