CVE-2025-71160
BaseFortify
Publication date: 2026-01-23
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.6 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.66 (exc) |
| linux | linux_kernel | From 4.18 (inc) to 6.6.121 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's netfilter nf_tables component, where the chain validation process (nft_chain_validate) can cause CPU soft lock-ups due to inefficient re-validation of chains. The issue arises because nf_tables traverses the entire chain graph for validation, even when some chains have already been validated. This leads to unnecessary repeated validations and potential CPU lock-ups. The fix avoids re-validating chains if they have already been checked, while ensuring that chain loop detection and base chain context validations are still correctly handled.
How can this vulnerability impact me? :
This vulnerability can cause CPU soft lock-ups, meaning the CPU can become stuck for extended periods (e.g., 27 seconds), leading to system performance degradation or unresponsiveness. This can affect systems using nftables for firewall or network packet filtering, potentially causing disruptions or denial of service due to the kernel's CPU being stuck during chain validation.