DEBIAN-CVE-2026-43208
In the Linux kernel, the following vulnerability has been resolved: net: do not pass flowid to setrpscpu() Blamed commit made the assumption that the RPS table for each receive queue would have the same size, and that it would not change. Compute flowid in setrpscpu(), do not assume we can use the value computed by getrpscpu(). Otherwise we risk out-of-bound access and/or crashes.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://security-tracker.debian.org/tracker/CVE-2026-43208
