CVE-2025-71079
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.16 |
| linux | linux_kernel | From 4.4.293 (inc) to 4.5 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.4 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.120 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.64 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 4.14.256 (inc) to 4.15 (exc) |
| linux | linux_kernel | From 4.19.218 (inc) to 4.20 (exc) |
| linux | linux_kernel | From 4.9.291 (inc) to 4.10 (exc) |
| linux | linux_kernel | From 5.10.82 (inc) to 5.10.248 (exc) |
| linux | linux_kernel | From 5.15.5 (inc) to 5.15.198 (exc) |
| linux | linux_kernel | From 5.16.1 (inc) to 6.1.160 (exc) |
| linux | linux_kernel | From 5.4.162 (inc) to 5.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deadlock issue in the Linux kernel's NFC subsystem. It occurs due to a lock ordering inversion between two locks: device_lock and rfkill_global_mutex. Specifically, one thread (rfkill_fop_write) locks rfkill_global_mutex first and then tries to acquire device_lock, while another thread (nfc_unregister_device) locks device_lock first and then tries to acquire rfkill_global_mutex. This creates a classic ABBA deadlock scenario where each thread waits indefinitely for the other to release a lock. The fix involves moving rfkill_unregister() and rfkill_destroy() calls outside the device_lock critical section to prevent this deadlock.
How can this vulnerability impact me? :
This deadlock vulnerability can cause the affected system to hang or freeze when NFC devices are being unregistered or when rfkill operations are performed concurrently. This can lead to denial of service conditions where NFC functionality becomes unresponsive, potentially impacting applications or services relying on NFC communication.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the deadlock issue between nfc_unregister_device and rfkill_fop_write has been fixed. The fix involves moving rfkill_unregister() and rfkill_destroy() calls outside the device_lock critical section to prevent the deadlock. Until the update is applied, avoid operations that trigger concurrent calls to nfc_unregister_device() and rfkill_fop_write() to reduce the risk of deadlock.