Cyber Posture

CVE-2025-71116

High

Published: 14 January 2026

Published
14 January 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0002 4.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-71116 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Credential Access (T1212); ranked at the 4.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Credential Access (T1212).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1212 Exploitation for Credential Access Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
Why these techniques?

Local kernel OOB read in libceph decode_pool enables direct exploitation for credential access via memory disclosure.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: libceph: make decode_pool() more resilient against corrupted osdmaps If the osdmap is (maliciously) corrupted such that the encoded length of ceph_pg_pool envelope is less than what is expected for a…

more

particular encoding version, out-of-bounds reads may ensue because the only bounds check that is there is based on that length value. This patch adds explicit bounds checks for each field that is decoded or skipped.

Deeper analysisAI

CVE-2025-71116 is a vulnerability in the Linux kernel's libceph component, specifically in the decode_pool() function used for parsing Ceph OSD maps. If an OSD map is corrupted—such as through malicious alteration—so that the encoded length of the ceph_pg_pool envelope is shorter than expected for a given encoding version, the function can perform out-of-bounds reads. This stems from relying solely on the corrupted length value for bounds checking, without explicit verification of individual fields. The issue is classified under CWE-125 (Out-of-bounds Read) with a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H).

A local attacker with low privileges can exploit this vulnerability by providing a maliciously corrupted OSD map to a system using libceph, such as one interacting with a Ceph storage cluster. Successful exploitation triggers out-of-bounds memory reads, potentially leading to high-impact confidentiality violations through kernel memory disclosure and high-impact availability disruptions via crashes or denial of service. No user interaction is required, and the attack is straightforward given low complexity and privileges.

Mitigation involves applying the upstream kernel patches referenced in the stable git commits, including 145d140abda80e33331c5781d6603014fa75d258, 2acb8517429ab42146c6c0ac1daed1f03d2fd125, 5d0d8c292531fe356c4e94dcfdf7d7212aca9957, 8c738512714e8c0aa18f8a10c072d5b01c83db39, and c82e39ff67353a5a6cbc07b786b8690bd2c45aaa. These patches enhance decode_pool() with explicit bounds checks for each decoded or skipped field, making it resilient to such corruptions. Security practitioners should update affected Linux kernels promptly, particularly those using Ceph integration.

Details

CWE(s)

Affected Products

linux
linux kernel
3.9, 6.19 · 3.9.1 — 5.10.248 · 5.11 — 5.15.198 · 5.16 — 6.1.160

CVEs Like This One

CVE-2025-21782Same product: Linux Linux Kernel
CVE-2025-21743Same product: Linux Linux Kernel
CVE-2026-23204Same product: Linux Linux Kernel
CVE-2026-31568Same product: Linux Linux Kernel
CVE-2026-43042Same product: Linux Linux Kernel
CVE-2026-31449Same product: Linux Linux Kernel
CVE-2026-23327Same product: Linux Linux Kernel
CVE-2024-57928Same product: Linux Linux Kernel
CVE-2024-57945Same product: Linux Linux Kernel
CVE-2026-31774Same product: Linux Linux Kernel

References