CVE-2025-71096
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 4.7 |
| linux | linux_kernel | From 5.11 (inc) to 5.15.198 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.4 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.160 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.120 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.64 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 4.7.1 (inc) to 5.10.248 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-908 | The product uses or accesses a resource that has not been initialized. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's RDMA core involves improper handling of the LS_NLA_TYPE_DGID attribute in netlink responses for RDMA_NL_LS_OP_IP_RESOLVE operations. The kernel did not correctly check for the presence of this attribute, which should always be present. The fix involves using proper netlink parsing logic to ensure the DGID data is correctly retrieved and failing if it is missing. This prevents an uninitialized read from the stack that could be triggered by userspace if it does not provide the DGID in a kernel-initiated query.
How can this vulnerability impact me? :
This vulnerability can lead to uninitialized memory reads in the kernel, which may cause system instability or crashes. It could potentially be exploited by userspace applications to trigger undefined behavior in the kernel, possibly leading to information leaks or denial of service.