-

CVE-2025-71180

In the Linux kernel, the following vulnerability has been resolved:

counter: interrupt-cnt: Drop IRQF_NO_THREAD flag

An IRQ handler can either be IRQF_NO_THREAD or acquire spinlock_t, as
CONFIG_PROVE_RAW_LOCK_NESTING warns:
=============================
[ BUG: Invalid wait context ]
6.18.0-rc1+git... #1
-----------------------------
some-user-space-process/1251 is trying to lock:
(&counter->events_list_lock){....}-{3:3}, at: counter_push_event [counter]
other info that might help us debug this:
context-{2:2}
no locks held by some-user-space-process/....
stack backtrace:
CPU: 0 UID: 0 PID: 1251 Comm: some-user-space-process 6.18.0-rc1+git... #1 PREEMPT
Call trace:
 show_stack (C)
 dump_stack_lvl
 dump_stack
 __lock_acquire
 lock_acquire
 _raw_spin_lock_irqsave
 counter_push_event [counter]
 interrupt_cnt_isr [interrupt_cnt]
 __handle_irq_event_percpu
 handle_irq_event
 handle_simple_irq
 handle_irq_desc
 generic_handle_domain_irq
 gpio_irq_handler
 handle_irq_desc
 generic_handle_domain_irq
 gic_handle_irq
 call_on_irq_stack
 do_interrupt_handler
 el0_interrupt
 __el0_irq_handler_common
 el0t_64_irq_handler
 el0t_64_irq

... and Sebastian correctly points out. Remove IRQF_NO_THREAD as an
alternative to switching to raw_spinlock_t, because the latter would limit
all potential nested locks to raw_spinlock_t only.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < ef668c9a2261ec9287faba6e6ef05a98b391aa2b
Version a55ebd47f21f6f0472766fb52c973849e31d1466
Status affected
Version < 51d2e5d6491447258cb39ff1deb93df15d3c23cb
Version a55ebd47f21f6f0472766fb52c973849e31d1466
Status affected
Version < 1c5a3175aecf82cd86dfcbef2a23e8b26d8d8e7c
Version a55ebd47f21f6f0472766fb52c973849e31d1466
Status affected
Version < 49a66829dd3653695e60d7cae13521d131362fcd
Version a55ebd47f21f6f0472766fb52c973849e31d1466
Status affected
Version < 425886b1f8304621b3f16632b274357067d5f13f
Version a55ebd47f21f6f0472766fb52c973849e31d1466
Status affected
Version < 23f9485510c338476b9735d516c1d4aacb810d46
Version a55ebd47f21f6f0472766fb52c973849e31d1466
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.13
Status affected
Version < 5.13
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.161
Status unaffected
Version <= 6.6.*
Version 6.6.121
Status unaffected
Version <= 6.12.*
Version 6.12.66
Status unaffected
Version <= 6.18.*
Version 6.18.6
Status unaffected
Version <= *
Version 6.19-rc5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.059
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.