CVE-2025-71086

HIGH

Linux kernel - Memory Corruption

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: net: rose: fix invalid array index in rose_kill_by_device() rose_kill_by_device() collects sockets into a local array[] and then iterates over them to disconnect sockets bound to a device being brought down. The loop mistakenly indexes array[cnt] instead of array[i]. For cnt < ARRAY_SIZE(array), this reads an uninitialized entry; for cnt == ARRAY_SIZE(array), it is an out-of-bounds read. Either case can lead to an invalid socket pointer dereference and also leaks references taken via sock_hold(). Fix the index to use i.

Scores

CVSS v3 7.8
EPSS 0.0002
EPSS Percentile 4.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-129
Status published
Products (26)
linux/Kernel < 5.10.248linux
linux/Kernel 5.11.0 - 5.15.198linux
linux/Kernel 5.16.0 - 6.1.160linux
linux/Kernel 6.2.0 - 6.6.120linux
linux/Kernel 6.7.0 - 6.18.4linux
Linux/Linux < 6.7
Linux/Linux 12e5a4719c99d7f4104e7e962393dfb8baa1c591 - 819fb41ae54960f66025802400c9d3935eef4042
Linux/Linux 3e0d1585799d8a991eba9678f297fd78d9f1846e - 1418c12cd3bba79dc56b57b61c99efe40f579981
Linux/Linux 5.10.248 - 5.10.*
Linux/Linux 5.15.198 - 5.15.*
... and 16 more
Published Jan 13, 2026
Tracked Since Feb 18, 2026