CVE-2025-71180
BaseFortify
Publication date: 2026-01-31
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.13 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.6 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.121 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.66 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.161 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.13.1 (inc) to 5.15.198 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves improper handling of interrupt request (IRQ) flags, specifically the IRQF_NO_THREAD flag. An IRQ handler can either use IRQF_NO_THREAD or acquire a spinlock (spinlock_t), but not both. The issue arises because using IRQF_NO_THREAD alongside locking mechanisms can cause invalid wait contexts and potential deadlocks or kernel bugs. The fix involves dropping the IRQF_NO_THREAD flag to avoid conflicts with raw spinlocks and nested locking scenarios.
How can this vulnerability impact me? :
This vulnerability can lead to kernel instability, including invalid wait contexts and potential deadlocks when interrupt handlers improperly acquire locks. This can cause system crashes or unpredictable behavior in the Linux kernel, affecting system reliability and availability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by removing the IRQF_NO_THREAD flag as an alternative to switching to raw_spinlock_t. Therefore, immediate mitigation involves updating the Linux kernel to a version where this fix is applied, ensuring that IRQ handlers do not use the IRQF_NO_THREAD flag improperly and avoid invalid wait contexts.