CVE-2025-71102

Source
https://cve.org/CVERecord?id=CVE-2025-71102
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71102.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-71102
Downstream
Related
Published
2026-01-14T15:05:52.389Z
Modified
2026-03-20T12:46:37.137560Z
Summary
scs: fix a wrong parameter in __scs_magic
Details

In the Linux kernel, the following vulnerability has been resolved:

scs: fix a wrong parameter in _scsmagic

_scsmagic() needs a 'void *' variable, but a 'struct taskstruct *' is given. 'taskscs(tsk)' is the starting address of the task's shadow call stack, and '__scsmagic(taskscs(tsk))' is the end address of the task's shadow call stack. Here should be '__scsmagic(taskscs(tsk))'.

The user-visible effect of this bug is that when CONFIGDEBUGSTACKUSAGE is enabled, the shadow call stack usage checking function (scscheck_usage) would scan an incorrect memory range. This could lead

  1. Inaccurate stack usage reporting: The function would calculate wrong usage statistics for the shadow call stack, potentially showing incorrect value in kmsg.

  2. Potential kernel crash: If the value of __scs_magic(tsk)is greater than that of __scsmagic(taskscs(tsk)), the for loop may access unmapped memory, potentially causing a kernel panic. However, this scenario is unlikely because taskstruct is allocated via the slab allocator (which typically returns lower addresses), while the shadow call stack returned by taskscs(tsk) is allocated via vmalloc(which typically returns higher addresses).

However, since this is purely a debugging feature (CONFIGDEBUGSTACK_USAGE), normal production systems should be not unaffected. The bug only impacts developers and testers who are actively debugging stack usage with this configuration enabled.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71102.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5bbaf9d1fcb9be696ee9a61636ab6803556c70f2
Fixed
1727e8bd69103a68963a5613a0ddb6d8d37df5d3
Fixed
cfdf6250b63b953b1d8e60814c8ca96c6f9d1c8c
Fixed
57ba40b001be27786d0570dd292289df748b306b
Fixed
062774439d442882b44f5eab8c256ad3423ef284
Fixed
9ef28943471a16e4f9646bc3e8e2de148e7d8d7b
Fixed
a19fb3611e4c06624fc0f83ef19f4fb8d57d4751
Fixed
08bd4c46d5e63b78e77f2605283874bbe868ab19

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71102.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.8.0
Fixed
5.10.248
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.198
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.160
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.120
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.64
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71102.json"