{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T22:39:28.273","vulnerabilities":[{"cve":{"id":"CVE-2025-71156","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2026-01-23T15:16:06.570","lastModified":"2026-02-26T20:23:02.490","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ngve: defer interrupt enabling until NAPI registration\n\nCurrently, interrupts are automatically enabled immediately upon\nrequest. This allows interrupt to fire before the associated NAPI\ncontext is fully initialized and cause failures like below:\n\n[    0.946369] Call Trace:\n[    0.946369]  <IRQ>\n[    0.946369]  __napi_poll+0x2a/0x1e0\n[    0.946369]  net_rx_action+0x2f9/0x3f0\n[    0.946369]  handle_softirqs+0xd6/0x2c0\n[    0.946369]  ? handle_edge_irq+0xc1/0x1b0\n[    0.946369]  __irq_exit_rcu+0xc3/0xe0\n[    0.946369]  common_interrupt+0x81/0xa0\n[    0.946369]  </IRQ>\n[    0.946369]  <TASK>\n[    0.946369]  asm_common_interrupt+0x22/0x40\n[    0.946369] RIP: 0010:pv_native_safe_halt+0xb/0x10\n\nUse the `IRQF_NO_AUTOEN` flag when requesting interrupts to prevent auto\nenablement and explicitly enable the interrupt in NAPI initialization\npath (and disable it during NAPI teardown).\n\nThis ensures that interrupt lifecycle is strictly coupled with\nreadiness of NAPI context."},{"lang":"es","value":"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\ngve: aplazar la habilitación de interrupciones hasta el registro de NAPI\n\nActualmente, las interrupciones se habilitan automáticamente inmediatamente después de la solicitud. Esto permite que la interrupción se dispare antes de que el contexto NAPI asociado esté completamente inicializado y cause fallos como los siguientes:\n\n[    0.946369] Traza de Llamada:\n[    0.946369]  \n[    0.946369]  __napi_poll+0x2a/0x1e0\n[    0.946369]  net_rx_action+0x2f9/0x3f0\n[    0.946369]  handle_softirqs+0xd6/0x2c0\n[    0.946369]  ? handle_edge_irq+0xc1/0x1b0\n[    0.946369]  __irq_exit_rcu+0xc3/0xe0\n[    0.946369]  common_interrupt+0x81/0xa0\n[    0.946369]  \n[    0.946369]  \n[    0.946369]  asm_common_interrupt+0x22/0x40\n[    0.946369] RIP: 0010:pv_native_safe_halt+0xb/0x10\n\nUtilice la bandera 'IRQF_NO_AUTOEN' al solicitar interrupciones para evitar la habilitación automática y habilitar explícitamente la interrupción en la ruta de inicialización de NAPI (y deshabilitarla durante la desinstalación de NAPI).\n\nEsto asegura que el ciclo de vida de la interrupción esté estrictamente acoplado con la disponibilidad del contexto NAPI."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9","versionEndExcluding":"6.12.64","matchCriteriaId":"0398C588-8C8B-454F-AF7A-87C8FB11D466"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.18.4","matchCriteriaId":"DC988EA0-0E32-457A-BF95-89BEB31A227B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*","matchCriteriaId":"17B67AA7-40D6-4AFA-8459-F200F3D7CFD1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*","matchCriteriaId":"C47E4CC9-C826-4FA9-B014-7FE3D9B318B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*","matchCriteriaId":"F71D92C0-C023-48BD-B3B6-70B638EEE298"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/3d970eda003441f66551a91fda16478ac0711617","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/48f9277680925e1a8623d6b2c50aadb7af824ace","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/f5b7f49bd2377916ad57cbd1210c61196daff013","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}