CVE-2025-71086
EUVD-2026-224713.01.2026, 16:16
In the Linux kernel, the following vulnerability has been resolved: net: rose: fix invalid array index in rose_kill_by_device() rose_kill_by_device() collects sockets into a local array[] and then iterates over them to disconnect sockets bound to a device being brought down. The loop mistakenly indexes array[cnt] instead of array[i]. For cnt < ARRAY_SIZE(array), this reads an uninitialized entry; for cnt == ARRAY_SIZE(array), it is an out-of-bounds read. Either case can lead to an invalid socket pointer dereference and also leaks references taken via sock_hold(). Fix the index to use i.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.19.304 ≤ 𝑥 < 4.20 |
| linux | linux_kernel | 5.4.266 ≤ 𝑥 < 5.5 |
| linux | linux_kernel | 5.10.206 ≤ 𝑥 < 5.10.248 |
| linux | linux_kernel | 5.15.146 ≤ 𝑥 < 5.15.198 |
| linux | linux_kernel | 6.1.70 ≤ 𝑥 < 6.1.160 |
| linux | linux_kernel | 6.6.9 ≤ 𝑥 < 6.6.120 |
| linux | linux_kernel | 6.7.1 ≤ 𝑥 < 6.12.64 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.18.4 |
| linux | linux_kernel | 6.7 |
| linux | linux_kernel | 6.19:rc1 |
| linux | linux_kernel | 6.19:rc2 |
| linux | linux_kernel | 6.19:rc3 |
| linux | linux_kernel | 6.19:rc4 |
| linux | linux_kernel | 6.19:rc5 |
| linux | linux_kernel | 6.19:rc6 |
| linux | linux_kernel | 6.19:rc7 |
| linux | linux_kernel | 6.19:rc8 |
𝑥
= Vulnerable software versions
Debian Releases
Vulnerability Media Exposure
References