A vulnerability was found in octeontx2-pf driver of Linux Kernel, where a buffer overflow could occur due to insufficient bounds checking on the variable *rss_context. This could potentially lead to memory corruption. The issue has been addressed by implementing proper bounds checking to ensure that input size limits are respected, thereby preventing buffer overflows and enhancing system security within the octeontx2-pf driver.
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.