Description
In the Linux kernel, the following vulnerability has been resolved: net: rose: fix invalid array index in rose_kill_by_device() rose_kill_by_device() collects sockets into a local array[] and then iterates over them to disconnect sockets bound to a device being brought down. The loop mistakenly indexes array[cnt] instead of array[i]. For cnt < ARRAY_SIZE(array), this reads an uninitialized entry; for cnt == ARRAY_SIZE(array), it is an out-of-bounds read. Either case can lead to an invalid socket pointer dereference and also leaks references taken via sock_hold(). Fix the index to use i.
References (7)
Scores
CVSS v3
7.8
EPSS
0.0002
EPSS Percentile
4.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-129
Status
published
Products (26)
linux/Kernel
< 5.10.248linux
linux/Kernel
5.11.0 - 5.15.198linux
linux/Kernel
5.16.0 - 6.1.160linux
linux/Kernel
6.2.0 - 6.6.120linux
linux/Kernel
6.7.0 - 6.18.4linux
Linux/Linux
< 6.7
Linux/Linux
12e5a4719c99d7f4104e7e962393dfb8baa1c591 - 819fb41ae54960f66025802400c9d3935eef4042
Linux/Linux
3e0d1585799d8a991eba9678f297fd78d9f1846e - 1418c12cd3bba79dc56b57b61c99efe40f579981
Linux/Linux
5.10.248 - 5.10.*
Linux/Linux
5.15.198 - 5.15.*
... and 16 more
Published
Jan 13, 2026
Tracked Since
Feb 18, 2026