CVE-2025-71156

Source
https://cve.org/CVERecord?id=CVE-2025-71156
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71156.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-71156
Downstream
Related
Published
2026-01-23T14:25:55.456Z
Modified
2026-05-15T04:14:13.541815825Z
Summary
gve: defer interrupt enabling until NAPI registration
Details

In the Linux kernel, the following vulnerability has been resolved:

gve: defer interrupt enabling until NAPI registration

Currently, interrupts are automatically enabled immediately upon request. This allows interrupt to fire before the associated NAPI context is fully initialized and cause failures like below:

[ 0.946369] Call Trace: [ 0.946369] <IRQ> [ 0.946369] __napipoll+0x2a/0x1e0 [ 0.946369] netrxaction+0x2f9/0x3f0 [ 0.946369] handlesoftirqs+0xd6/0x2c0 [ 0.946369] ? handleedgeirq+0xc1/0x1b0 [ 0.946369] __irqexitrcu+0xc3/0xe0 [ 0.946369] commoninterrupt+0x81/0xa0 [ 0.946369] </IRQ> [ 0.946369] <TASK> [ 0.946369] asmcommoninterrupt+0x22/0x40 [ 0.946369] RIP: 0010:pvnativesafehalt+0xb/0x10

Use the IRQF_NO_AUTOEN flag when requesting interrupts to prevent auto enablement and explicitly enable the interrupt in NAPI initialization path (and disable it during NAPI teardown).

This ensures that interrupt lifecycle is strictly coupled with readiness of NAPI context.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71156.json"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.9.0
Fixed
6.12.64
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71156.json"