CVE-2025-71080
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.12 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.4 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.12.1 (inc) to 6.12.64 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-617 | The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's IPv6 routing code on PREEMPT_RT kernels. After the function rt6_get_pcpu_route() returns NULL, the current task can be preempted, allowing another task on the same CPU to install a per-CPU routing entry (pcpu_rt). When the first task resumes, its attempt to install the route fails due to a race condition, triggering a BUG_ON error. The fix involves handling this race condition gracefully by freeing the allocation and returning the existing route instead of causing a BUG_ON, replacing it with a WARN_ON_ONCE for non-PREEMPT_RT kernels.
How can this vulnerability impact me? :
This vulnerability can cause kernel BUGs (crashes) on PREEMPT_RT Linux kernels due to a race condition in IPv6 routing code. This can lead to system instability or crashes, potentially affecting the availability and reliability of systems running affected kernels.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by updating the Linux kernel to a version that includes the patch for the BUG in rt6_get_pcpu_route() under PREEMPT_RT. Immediate mitigation involves applying the kernel update that handles the cmpxchg() failure gracefully and replaces the BUG_ON with WARN_ON_ONCE, preventing the BUG from triggering.