CVE-2025-71180

Source
https://cve.org/CVERecord?id=CVE-2025-71180
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71180.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-71180
Downstream
Published
2026-01-31T11:38:52.481Z
Modified
2026-03-20T12:46:39.252606Z
Summary
counter: interrupt-cnt: Drop IRQF_NO_THREAD flag
Details

In the Linux kernel, the following vulnerability has been resolved:

counter: interrupt-cnt: Drop IRQFNOTHREAD flag

An IRQ handler can either be IRQFNOTHREAD or acquire spinlock_t, as

CONFIGPROVERAWLOCKNESTING warns:

[ BUG: Invalid wait context ]

6.18.0-rc1+git... #1

some-user-space-process/1251 is trying to lock: (&counter->eventslistlock){....}-{3:3}, at: counterpushevent [counter] other info that might help us debug this: context-{2:2} no locks held by some-user-space-process/.... stack backtrace: CPU: 0 UID: 0 PID: 1251 Comm: some-user-space-process 6.18.0-rc1+git... #1 PREEMPT Call trace: showstack (C) dumpstacklvl dumpstack __lockacquire lockacquire rawspin_lockirqsave counterpushevent [counter] interruptcntisr [interruptcnt] __handleirqevent_percpu handleirqevent handlesimpleirq handleirqdesc generichandledomainirq gpioirqhandler handleirqdesc generichandledomainirq gichandleirq callonirqstack dointerrupthandler el0interrupt __el0irqhandlercommon el0t64irqhandler el0t64irq

... and Sebastian correctly points out. Remove IRQFNOTHREAD as an alternative to switching to rawspinlockt, because the latter would limit all potential nested locks to rawspinlockt only.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71180.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a55ebd47f21f6f0472766fb52c973849e31d1466
Fixed
ef668c9a2261ec9287faba6e6ef05a98b391aa2b
Fixed
51d2e5d6491447258cb39ff1deb93df15d3c23cb
Fixed
1c5a3175aecf82cd86dfcbef2a23e8b26d8d8e7c
Fixed
49a66829dd3653695e60d7cae13521d131362fcd
Fixed
425886b1f8304621b3f16632b274357067d5f13f
Fixed
23f9485510c338476b9735d516c1d4aacb810d46

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71180.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.13.0
Fixed
5.15.198
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.161
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.121
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.66
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71180.json"