{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-71180","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-01-31T11:36:51.183Z","datePublished":"2026-01-31T11:38:52.481Z","dateUpdated":"2026-05-11T21:56:12.391Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:56:12.391Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncounter: interrupt-cnt: Drop IRQF_NO_THREAD flag\n\nAn IRQ handler can either be IRQF_NO_THREAD or acquire spinlock_t, as\nCONFIG_PROVE_RAW_LOCK_NESTING warns:\n=============================\n[ BUG: Invalid wait context ]\n6.18.0-rc1+git... #1\n-----------------------------\nsome-user-space-process/1251 is trying to lock:\n(&counter->events_list_lock){....}-{3:3}, at: counter_push_event [counter]\nother info that might help us debug this:\ncontext-{2:2}\nno locks held by some-user-space-process/....\nstack backtrace:\nCPU: 0 UID: 0 PID: 1251 Comm: some-user-space-process 6.18.0-rc1+git... #1 PREEMPT\nCall trace:\n show_stack (C)\n dump_stack_lvl\n dump_stack\n __lock_acquire\n lock_acquire\n _raw_spin_lock_irqsave\n counter_push_event [counter]\n interrupt_cnt_isr [interrupt_cnt]\n __handle_irq_event_percpu\n handle_irq_event\n handle_simple_irq\n handle_irq_desc\n generic_handle_domain_irq\n gpio_irq_handler\n handle_irq_desc\n generic_handle_domain_irq\n gic_handle_irq\n call_on_irq_stack\n do_interrupt_handler\n el0_interrupt\n __el0_irq_handler_common\n el0t_64_irq_handler\n el0t_64_irq\n\n... and Sebastian correctly points out. Remove IRQF_NO_THREAD as an\nalternative to switching to raw_spinlock_t, because the latter would limit\nall potential nested locks to raw_spinlock_t only."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/counter/interrupt-cnt.c"],"versions":[{"version":"a55ebd47f21f6f0472766fb52c973849e31d1466","lessThan":"ef668c9a2261ec9287faba6e6ef05a98b391aa2b","status":"affected","versionType":"git"},{"version":"a55ebd47f21f6f0472766fb52c973849e31d1466","lessThan":"51d2e5d6491447258cb39ff1deb93df15d3c23cb","status":"affected","versionType":"git"},{"version":"a55ebd47f21f6f0472766fb52c973849e31d1466","lessThan":"1c5a3175aecf82cd86dfcbef2a23e8b26d8d8e7c","status":"affected","versionType":"git"},{"version":"a55ebd47f21f6f0472766fb52c973849e31d1466","lessThan":"49a66829dd3653695e60d7cae13521d131362fcd","status":"affected","versionType":"git"},{"version":"a55ebd47f21f6f0472766fb52c973849e31d1466","lessThan":"425886b1f8304621b3f16632b274357067d5f13f","status":"affected","versionType":"git"},{"version":"a55ebd47f21f6f0472766fb52c973849e31d1466","lessThan":"23f9485510c338476b9735d516c1d4aacb810d46","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/counter/interrupt-cnt.c"],"versions":[{"version":"5.13","status":"affected"},{"version":"0","lessThan":"5.13","status":"unaffected","versionType":"semver"},{"version":"5.15.198","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.161","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.121","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.66","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.6","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"5.15.198"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.1.161"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.6.121"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.12.66"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.18.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.19"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/ef668c9a2261ec9287faba6e6ef05a98b391aa2b"},{"url":"https://git.kernel.org/stable/c/51d2e5d6491447258cb39ff1deb93df15d3c23cb"},{"url":"https://git.kernel.org/stable/c/1c5a3175aecf82cd86dfcbef2a23e8b26d8d8e7c"},{"url":"https://git.kernel.org/stable/c/49a66829dd3653695e60d7cae13521d131362fcd"},{"url":"https://git.kernel.org/stable/c/425886b1f8304621b3f16632b274357067d5f13f"},{"url":"https://git.kernel.org/stable/c/23f9485510c338476b9735d516c1d4aacb810d46"}],"title":"counter: interrupt-cnt: Drop IRQF_NO_THREAD flag","x_generator":{"engine":"bippy-1.2.0"}}}}