CVE-2025-71181
BaseFortify
Publication date: 2026-01-31
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.18 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.18.1 (inc) to 6.18.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deadlock issue in the Linux kernel's Rust Binder component. Specifically, a spin_lock() call was mistakenly left in the rust_shrink_free_page() function after forward-porting Rust Binder to kernel version 6.18. This caused recursive locking attempts leading to deadlocks and kernel crashes because the lock was being acquired twice by the same task without proper nesting notation. The fix involved removing the spin_lock() call from rust_shrink_free_page().
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to deadlock and crash due to recursive locking in the Rust Binder driver. Such crashes can lead to system instability, potential data loss, and service interruptions on affected systems running the vulnerable kernel version.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for warnings about recursive locking or deadlocks related to rust_binder and spin_lock usage. Specifically, look for messages similar to "WARNING: possible recursive locking detected" and deadlock traces involving rust_helper_spin_lock and kswapd. You can use the command `dmesg | grep -i 'recursive locking'` or `journalctl -k | grep -i 'recursive locking'` to find such messages in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where the spin_lock() call has been removed from rust_shrink_free_page(), as this fix resolves the deadlock issue. Until then, avoid using affected kernel versions or disable the rust_binder feature if possible to prevent the unsafe locking scenario.