In the Linux kernel, the following vulnerability has been resolved: net: rose: fix invalid array index in rose_kill_by_device() rose_kill_by_device() collects sockets into a local array[] and then iterates over them to disconnect sockets bound to a device being brought down. The loop mistakenly indexes array[cnt] instead of array[i]. For cnt < ARRAY_SIZE(array), this reads an uninitialized entry; for cnt == ARRAY_SIZE(array), it is an out-of-bounds read. Either case can lead to an invalid socket pointer dereference and also leaks references taken via sock_hold(). Fix the index to use i.
| Vendor | Product | Versions |
|---|---|---|
| linux | linux_kernel | < 4.20, < 5.5, < 5.10.248, < 5.15.198, < 6.1.160, < 6.6.120, < 6.12.64, < 6.18.4 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| amazon | amazon linux | cert_advisory | 90% |
| canonical | ubuntu linux | cert_advisory | 90% |
| debian | debian linux | cert_advisory | 90% |
| ibm | ibm qradar siem | cert_advisory | 90% |
| open source | open source linux kernel | cert_advisory | 90% |