CVE-2026-23165
📋 TL;DR
This CVE describes a deadlock vulnerability in the Linux kernel's sfc driver when handling RSS (Receive Side Scaling) configuration reads via ethtool commands. The vulnerability affects Linux systems using the sfc network driver and can cause system instability or denial of service. Only systems with the affected driver are impacted.
💻 Affected Systems
- Linux kernel with sfc driver
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
System deadlock requiring hard reboot, causing extended service disruption and potential data loss.
Likely Case
Temporary network service interruption when specific ethtool commands are executed, requiring manual intervention to recover.
If Mitigated
Minor performance impact or command failure without system-wide disruption.
🎯 Exploit Status
Exploitation requires local access or privileged remote access to execute ethtool commands. More likely to be triggered accidentally than maliciously.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing fixes 590c8179ffb01c17644181408821b55b8704c50c and 944c614b0a7afa5b87612c3fb557b95a50ad654c
Vendor Advisory: https://git.kernel.org/stable/c/590c8179ffb01c17644181408821b55b8704c50c
Restart Required: No
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. For custom kernels: Apply patches from kernel.org and rebuild.
🔧 Temporary Workarounds
Avoid ethtool -x commands
allPrevent triggering the deadlock by avoiding RSS configuration queries on affected interfaces
# Do not run: ethtool -x <interface>
# Monitor for any automated scripts using this command
🧯 If You Can't Patch
- Restrict ethtool command execution to trusted administrators only
- Monitor system logs for deadlock indicators and have reboot procedures ready
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if sfc driver is loaded: 'uname -r' and 'lsmod | grep sfc'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is newer than fix commits and test ethtool -x command on sfc interfaces
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- System hang/freeze events
- Network interface errors in dmesg
Network Indicators:
- Sudden loss of network connectivity on affected interfaces
SIEM Query:
source="kernel" AND ("deadlock" OR "sfc" OR "rss_lock")