Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-43208

In the Linux kernel, the following vulnerability has been resolved: net: do not pass flow_id to set_rps_cpu() Blamed commit made the assumption that the RPS table for each receive queue would have the same size, and that it would not change. Compute flow_id in set_rps_cpu(), do not assume we can use the value computed by get_rps_cpu(). Otherwise we risk out-of-bound access and/or crashes.

View on NVD

Analysis

The Linux kernel networking stack contains a critical vulnerability in the Receive Packet Steering (RPS) mechanism. This flaw could allow remote attackers to cause system crashes or potentially achieve code execution via crafted network traffic, impacting almost all Linux-based server infrastructure.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH

EPSS

Probability of exploitation (next 30 days): 0.0002 (0.0%)
Percentile: 4.1%
EPSS: 2026-05-08

Technical description

In the Linux kernel, the following vulnerability has been resolved: net: do not pass flow_id to set_rps_cpu() Blamed commit made the assumption that the RPS table for each receive queue would have the same size, and that it would not change. Compute flow_id in set_rps_cpu(), do not assume we can use the value computed by get_rps_cpu(). Otherwise we risk out-of-bound access and/or crashes.

Published: 5/6/2026, 12:16:40 PM
Last modified: 5/8/2026, 1:16:45 PM

References

HomeEventsBlogResourcesTeam