Description
In the Linux kernel, the following vulnerability has been resolved: net: do not pass flow_id to set_rps_cpu() Blamed commit made the assumption that the RPS table for each receive queue would have the same size, and that it would not change. Compute flow_id in set_rps_cpu(), do not assume we can use the value computed by get_rps_cpu(). Otherwise we risk out-of-bound access and/or crashes.
Product status
48aa30443e52c9666d5cd5e67532e475f212337e (git) before 5455a232edea6b946b99449f15ca771a8874a5a6
48aa30443e52c9666d5cd5e67532e475f212337e (git) before ed712dc0d64dee5f0d05e4d8ca57711f8a9c850c
48aa30443e52c9666d5cd5e67532e475f212337e (git) before 8a8a9fac9efa6423fd74938b940cb7d731780718
6.18
Any version before 6.18
6.18.16 (semver)
6.19.6 (semver)
7.0 (original_commit_for_fix)
References
git.kernel.org/...c/5455a232edea6b946b99449f15ca771a8874a5a6
git.kernel.org/...c/ed712dc0d64dee5f0d05e4d8ca57711f8a9c850c
git.kernel.org/...c/8a8a9fac9efa6423fd74938b940cb7d731780718