CVE-2025-71161
BaseFortify
Publication date: 2026-01-23
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.5 (inc) to 6.18.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-193 | A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's dm-verity feature involves recursive forward error correction (FEC). The problem is twofold: first, the recursive correction can cause a denial-of-service because a loop with 253 iterations can recursively call a function up to 4 nested times, potentially leading to billions of iterations and causing processes to hang. Second, the recursive correction does not work properly because a shared buffer is overwritten during recursive calls, leading to incorrect data handling.
How can this vulnerability impact me? :
The vulnerability can cause denial-of-service conditions by making processes, such as the udev-worker, get stuck and become unresponsive. This can affect system stability and availability, potentially disrupting normal operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the dm-verity recursive forward error correction has been disabled and fixed. This will prevent the denial-of-service condition caused by recursive calls in fec_read_bufs and avoid the shared buffer corruption issue.