CVE-2025-71101

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
13/01/2026
Last modified:
25/03/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing<br /> <br /> The hp_populate_*_elements_from_package() functions in the hp-bioscfg<br /> driver contain out-of-bounds array access vulnerabilities.<br /> <br /> These functions parse ACPI packages into internal data structures using<br /> a for loop with index variable &amp;#39;elem&amp;#39; that iterates through<br /> enum_obj/integer_obj/order_obj/password_obj/string_obj arrays.<br /> <br /> When processing multi-element fields like PREREQUISITES and<br /> ENUM_POSSIBLE_VALUES, these functions read multiple consecutive array<br /> elements using expressions like &amp;#39;enum_obj[elem + reqs]&amp;#39; and<br /> &amp;#39;enum_obj[elem + pos_values]&amp;#39; within nested loops.<br /> <br /> The bug is that the bounds check only validated elem, but did not consider<br /> the additional offset when accessing elem + reqs or elem + pos_values.<br /> <br /> The fix changes the bounds check to validate the actual accessed index.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.1 (including) 6.6.120 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.64 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.18.4 (excluding)
cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*