CVE-2025-71100
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.9 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.4 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.9.1 (inc) to 6.12.64 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-129 | The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's Realtek rtlwifi driver for the 8192cu device. The issue is that the TID (Traffic Identifier) obtained from ieee80211_get_tid() can be out of the valid range for the array sta_entry->tids[]. Without proper checking, this leads to an out-of-bounds array access, which is detected by UBSAN (Undefined Behavior Sanitizer) as an array-index-out-of-bounds error. The fix involves verifying that the TID is less than MAX_TID_COUNT before using it as an index.
How can this vulnerability impact me? :
This vulnerability can cause undefined behavior in the kernel due to out-of-bounds array access, which may lead to system instability, crashes, or potential security issues such as memory corruption. However, no specific exploit or impact details are provided.