CVE-2025-71093
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.11 (inc) to 5.15.198 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.4 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.160 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.120 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.64 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 3.18.1 (inc) to 5.10.248 (exc) |
| linux | linux_kernel | 3.18 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer out-of-bounds (OOB) read in the Linux kernel's e1000 network driver, specifically in the function e1000_tbi_should_accept(). The function reads the last byte of a network frame without properly validating the frame length first. If the reported length is zero or larger than the actual receive (RX) buffer size, this read accesses memory beyond the intended buffer, potentially reading unrelated memory areas. This issue occurs during the NAPI receive path and can lead to a kernel memory safety violation.
How can this vulnerability impact me? :
The impact of this vulnerability is that it can cause out-of-bounds memory reads in the kernel, which may lead to system instability, crashes, or exposure of sensitive kernel memory contents. Since it involves reading beyond the allocated buffer, it could potentially be exploited to leak information or cause denial of service by crashing the kernel or network driver.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability can be mitigated by applying the fix that rejects frames early if the length is zero or if it exceeds the adapter's RX buffer length. This prevents out-of-bounds memory access in the e1000 driver. Therefore, updating the Linux kernel to a version that includes this fix is the immediate step to mitigate this vulnerability.