Home

Description

In the Linux kernel, the following vulnerability has been resolved: net: do not pass flow_id to set_rps_cpu() Blamed commit made the assumption that the RPS table for each receive queue would have the same size, and that it would not change. Compute flow_id in set_rps_cpu(), do not assume we can use the value computed by get_rps_cpu(). Otherwise we risk out-of-bound access and/or crashes.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-08 | Assigner Linux




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

48aa30443e52c9666d5cd5e67532e475f212337e (git) before 5455a232edea6b946b99449f15ca771a8874a5a6
affected

48aa30443e52c9666d5cd5e67532e475f212337e (git) before ed712dc0d64dee5f0d05e4d8ca57711f8a9c850c
affected

48aa30443e52c9666d5cd5e67532e475f212337e (git) before 8a8a9fac9efa6423fd74938b940cb7d731780718
affected

Default status
affected

6.18
affected

Any version before 6.18
unaffected

6.18.16 (semver)
unaffected

6.19.6 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/5455a232edea6b946b99449f15ca771a8874a5a6

git.kernel.org/...c/ed712dc0d64dee5f0d05e4d8ca57711f8a9c850c

git.kernel.org/...c/8a8a9fac9efa6423fd74938b940cb7d731780718

cve.org (CVE-2026-43208)

nvd.nist.gov (CVE-2026-43208)

Download JSON