CVE-2026-43208
Linux Kernel RPS Flow ID Handling Remote Code Execution
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves improper handling of the flow_id parameter in the set_rps_cpu() function. The original code assumed that the RPS (Receive Packet Steering) table for each receive queue would have the same size and remain unchanged. However, this assumption was incorrect. The vulnerability arises because the code used a flow_id value computed by get_rps_cpu() without recalculating it in set_rps_cpu(), which could lead to out-of-bound memory access or crashes.
How can this vulnerability impact me? :
This vulnerability can cause out-of-bound memory access or crashes in the Linux kernel's network stack. Such crashes can lead to denial of service conditions, potentially disrupting network communications or system stability.