CVE-2025-71181

In the Linux kernel, the following vulnerability has been resolved: rust_binder: remove spin_lock() in rust_shrink_free_page() When forward-porting Rust Binder to 6.18, I neglected to take commit fb56fdf8b9a2 ("mm/list_lru: split the lock to per-cgroup scope") into account, and apparently I did not end up running the shrinker callback when I sanity tested the driver before submission. This leads to crashes like the following: ============================================ WARNING: possible recursive locking detected 6.18.0-mainline-maybe-dirty #1 Tainted: G IO -------------------------------------------- kswapd0/68 is trying to acquire lock: ffff956000fa18b0 (&l->lock){+.+.}-{2:2}, at: lock_list_lru_of_memcg+0x128/0x230 but task is already holding lock: ffff956000fa18b0 (&l->lock){+.+.}-{2:2}, at: rust_helper_spin_lock+0xd/0x20 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&l->lock); lock(&l->lock); *** DEADLOCK *** May be due to missing lock nesting notation 3 locks held by kswapd0/68: #0: ffffffff90d2e260 (fs_reclaim){+.+.}-{0:0}, at: kswapd+0x597/0x1160 #1: ffff956000fa18b0 (&l->lock){+.+.}-{2:2}, at: rust_helper_spin_lock+0xd/0x20 #2: ffffffff90cf3680 (rcu_read_lock){....}-{1:2}, at: lock_list_lru_of_memcg+0x2d/0x230 To fix this, remove the spin_lock() call from rust_shrink_free_page().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*

History

25 Mar 2026, 19:43

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: rust_binder: eliminar spin_lock() en rust_shrink_free_page() Al portar Rust Binder a la versión 6.18, descuidé tener en cuenta el commit fb56fdf8b9a2 ('mm/list_lru: split the lock to per-cgroup scope'), y aparentemente no terminé ejecutando la devolución de llamada del reductor cuando probé la cordura del controlador antes de la entrega. Esto lleva a fallos como el siguiente: ============================================ ADVERTENCIA: posible bloqueo recursivo detectado 6.18.0-mainline-maybe-dirty #1 Tainted: G IO -------------------------------------------- kswapd0/68 está intentando adquirir el bloqueo: ffff956000fa18b0 (&l->lock){+.+.}-{2:2}, en: lock_list_lru_of_memcg+0x128/0x230 pero la tarea ya está manteniendo el bloqueo: ffff956000fa18b0 (&l->lock){+.+.}-{2:2}, en: rust_helper_spin_lock+0xd/0x20 otra información que podría ayudarnos a depurar esto: Posible escenario de bloqueo inseguro: CPU0 ---- lock(&l->lock); lock(&l->lock); * INTERBLOQUEO * Puede deberse a la falta de notación de anidamiento de bloqueo 3 bloqueos mantenidos por kswapd0/68: #0: ffffffff90d2e260 (fs_reclaim){+.+.}-{0:0}, en: kswapd+0x597/0x1160 #1: ffff956000fa18b0 (&l->lock){+.+.}-{2:2}, en: rust_helper_spin_lock+0xd/0x20 #2: ffffffff90cf3680 (rcu_read_lock){....}-{1:2}, en: lock_list_lru_of_memcg+0x2d/0x230 Para solucionar esto, elimine la llamada a spin_lock() de rust_shrink_free_page().
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
CWE CWE-667
References () https://git.kernel.org/stable/c/30a98c97f7874031f2e1de19c777ce011143cba4 - () https://git.kernel.org/stable/c/30a98c97f7874031f2e1de19c777ce011143cba4 - Patch
References () https://git.kernel.org/stable/c/361e0ff456a8daf9753c18030533256e4133ce7a - () https://git.kernel.org/stable/c/361e0ff456a8daf9753c18030533256e4133ce7a - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

31 Jan 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-31 12:16

Updated : 2026-03-25 19:43


NVD link : CVE-2025-71181

Mitre link : CVE-2025-71181

CVE.ORG link : CVE-2025-71181


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking