Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2914 articles · 109790 vulns · 38/41 feeds (7d)
← Back to list
7.8
CVE-2025-71086PATCHED
linux · linux_kernel

In the Linux kernel, the following vulnerability has been resolved: net: rose: fix invalid array index in rose_kill_by_device() rose_kill_by_device() collects sockets into a local array[] and then i

Description

In the Linux kernel, the following vulnerability has been resolved: net: rose: fix invalid array index in rose_kill_by_device() rose_kill_by_device() collects sockets into a local array[] and then iterates over them to disconnect sockets bound to a device being brought down. The loop mistakenly indexes array[cnt] instead of array[i]. For cnt < ARRAY_SIZE(array), this reads an uninitialized entry; for cnt == ARRAY_SIZE(array), it is an out-of-bounds read. Either case can lead to an invalid socket pointer dereference and also leaks references taken via sock_hold(). Fix the index to use i.

Affected Products

VendorProductVersions
linuxlinux_kernel< 4.20, < 5.5, < 5.10.248, < 5.15.198, < 6.1.160, < 6.6.120, < 6.12.64, < 6.18.4

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
amazonamazon linuxcert_advisory90%
canonicalubuntu linuxcert_advisory90%
debiandebian linuxcert_advisory90%
ibmibm qradar siemcert_advisory90%
open sourceopen source linux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/1418c12cd3bba79dc56b57b61c99efe40f579981(Patch)
  • https://git.kernel.org/stable/c/6595beb40fb0ec47223d3f6058ee40354694c8e4(Patch)
  • https://git.kernel.org/stable/c/819fb41ae54960f66025802400c9d3935eef4042(Patch)
  • https://git.kernel.org/stable/c/92d900aac3a5721fb54f3328f1e089b44a861c38(Patch)
  • https://git.kernel.org/stable/c/9f6185a32496834d6980b168cffcccc2d6b17280(Patch)
  • https://git.kernel.org/stable/c/b409ba9e1e63ccf3ab4cc061e33c1f804183543e(Patch)
  • https://git.kernel.org/stable/c/ed2639414d43ba037f798eaf619e878309310451(Patch)

Related News (5 articles)

Tier B
CERT-FR15h ago
Multiples vulnérabilités dans le noyau Linux d'Ubuntu (10 avril 2026)
→ No new info (linked only)
Tier B
CERT-FR7d ago
Multiples vulnérabilités dans le noyau Linux d'Ubuntu (03 avril 2026)
→ No new info (linked only)
Tier B
BSI Advisories8d ago
[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier B
CERT-FR14d ago
Multiples vulnérabilités dans le noyau Linux de SUSE (27 mars 2026)
→ No new info (linked only)
Tier B
CERT-FR14d ago
Multiples vulnérabilités dans le noyau Linux d'Ubuntu (27 mars 2026)
→ No new info (linked only)
CVSS 3.17.8 HIGH
VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
4.205.55.10.2485.15.1986.1.1606.6.1206.12.646.18.4
CWECWE-129
PublishedJan 13, 2026
Last enriched8d ago
Trending Score38
Source articles5
Independent2
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-23406EXP
apparmor: fix side-effect bug in match_char() macro usage
Trending: 64
HIGHCVE-2026-23400EXP
In the Linux kernel, the following vulnerability has been resolved: rust_binder: call set_notification_done() without proc lock Consider the following sequence of events on a death listener: 1. The
Trending: 62
HIGHCVE-2026-31412EXP
usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks()
Trending: 62
HIGHCVE-2026-23398EXP
In the Linux kernel, the following vulnerability has been resolved: icmp: fix NULL pointer dereference in icmp_tag_validation() icmp_tag_validation() unconditionally dereferences the result of rcu_d
Trending: 59
HIGHCVE-2026-23001
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan
Trending: 39

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Jan 13, 2026
Patch Available
Mar 25, 2026
Discovered by ZDM
Apr 1, 2026