Description
In the Linux kernel, the following vulnerability has been resolved:

net: do not pass flow_id to set_rps_cpu()

Blamed commit made the assumption that the RPS table for each receive
queue would have the same size, and that it would not change.

Compute flow_id in set_rps_cpu(), do not assume we can use the value
computed by get_rps_cpu(). Otherwise we risk out-of-bound access
and/or crashes.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel contains a flaw where the commit that handles receive packet steering incorrectly reuses a flow identifier computed elsewhere. This incorrect reuse allows the kernel to access memory beyond the bounds of the RPS table, potentially leading to a crash or loss of data integrity. The vulnerability is a classic out‑of‑bounds memory access that can cause the operating system to become unstable or unusable.

Affected Systems

All Linux kernel builds that do not include the commit that corrects the flow‑ID handling are affected. The issue does not appear to be tied to a specific kernel version; any distribution that has not applied the patch will be vulnerable.

Risk and Exploitability

The severity is high because a process able to craft network packets that trigger the flawed logic could cause a kernel fault. The EPSS score is not available, and the vulnerability is not listed in CISA KEV, so the publicly known exploitation probability is uncertain. The likely attack vector involves manipulating network traffic that is processed by the receive queue, which could be local or remote depending on the system configuration. System administrators should assume that any exploitation could result in a denial of service and should act quickly to mitigate.

Generated by OpenCVE AI on May 6, 2026 at 14:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a Linux kernel version that includes the RPS table size check fix (commit 5455a232e or later).
  • If a distribution update is unavailable, obtain the patch from the kernel Git repository, apply it to the source tree, and rebuild the kernel.
  • Temporarily disable receive packet steering by setting the appropriate sysctl parameters (e.g., echo 0 > /sys/module/rps/parameters/rps_enabled).

Generated by OpenCVE AI on May 6, 2026 at 14:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: do not pass flow_id to set_rps_cpu() Blamed commit made the assumption that the RPS table for each receive queue would have the same size, and that it would not change. Compute flow_id in set_rps_cpu(), do not assume we can use the value computed by get_rps_cpu(). Otherwise we risk out-of-bound access and/or crashes.
Title net: do not pass flow_id to set_rps_cpu()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:28:12.292Z

Reserved: 2026-05-01T14:12:55.993Z

Link: CVE-2026-43208

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:40.170

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43208

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T17:15:08Z

Weaknesses