CVE-2025-71111

In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Convert macros to functions to avoid TOCTOU The macro FAN_FROM_REG evaluates its arguments multiple times. When used in lockless contexts involving shared driver data, this leads to Time-of-Check to Time-of-Use (TOCTOU) race conditions, potentially causing divide-by-zero errors. Convert the macro to a static function. This guarantees that arguments are evaluated only once (pass-by-value), preventing the race conditions. Additionally, in store_fan_div, move the calculation of the minimum limit inside the update lock. This ensures that the read-modify-write sequence operates on consistent data. Adhere to the principle of minimal changes by only converting macros that evaluate arguments multiple times and are used in lockless contexts.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*

History

25 Mar 2026, 19:27

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3dceb68f6ad33156032ef4da21a93d84059cca6d - () https://git.kernel.org/stable/c/3dceb68f6ad33156032ef4da21a93d84059cca6d - Patch
References () https://git.kernel.org/stable/c/670d7ef945d3a84683594429aea6ab2cdfa5ceb4 - () https://git.kernel.org/stable/c/670d7ef945d3a84683594429aea6ab2cdfa5ceb4 - Patch
References () https://git.kernel.org/stable/c/a9fb6e8835a22f5796c1182ed612daed3fd273af - () https://git.kernel.org/stable/c/a9fb6e8835a22f5796c1182ed612daed3fd273af - Patch
References () https://git.kernel.org/stable/c/bf5b03227f2e6d4360004886d268f9df8993ef8f - () https://git.kernel.org/stable/c/bf5b03227f2e6d4360004886d268f9df8993ef8f - Patch
References () https://git.kernel.org/stable/c/c8cf0c2bdcccc6634b6915ff793b844e12436680 - () https://git.kernel.org/stable/c/c8cf0c2bdcccc6634b6915ff793b844e12436680 - Patch
References () https://git.kernel.org/stable/c/f2b579a0c37c0df19603d719894a942a295f634a - () https://git.kernel.org/stable/c/f2b579a0c37c0df19603d719894a942a295f634a - Patch
References () https://git.kernel.org/stable/c/f94800fbc26ccf7c81eb791707b038a57aa39a18 - () https://git.kernel.org/stable/c/f94800fbc26ccf7c81eb791707b038a57aa39a18 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
CWE CWE-367
First Time Linux
Linux linux Kernel

19 Jan 2026, 13:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3dceb68f6ad33156032ef4da21a93d84059cca6d -
  • () https://git.kernel.org/stable/c/bf5b03227f2e6d4360004886d268f9df8993ef8f -

14 Jan 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-14 15:16

Updated : 2026-03-25 19:27


NVD link : CVE-2025-71111

Mitre link : CVE-2025-71111

CVE.ORG link : CVE-2025-71111


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition