CVE-2025-71072
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.6 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.3 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.6.1 (inc) to 6.12.64 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's shmem subsystem, specifically in how it handles rename operations when memory is critically low. The functions simple_offset_rename() and simple_offset_rename_exchange() do not properly recover from failures during maple_tree insertions caused by low memory. Additionally, shmem_whiteout() assumes that if it succeeds, subsequent operations will also succeed, which is not always the case. The fix involves preinserting the target into the tree to avoid failures after successful shmem_whiteout() calls, ensuring better recovery and stability during rename failures.
How can this vulnerability impact me? :
This vulnerability can cause failures or instability in the Linux kernel's shared memory rename operations under low memory conditions. This could potentially lead to unexpected errors or data handling issues during file renaming in shared memory, possibly affecting system reliability or causing application errors that depend on these operations.