CVE-2025-71102
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/01/2026
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scs: fix a wrong parameter in __scs_magic<br />
<br />
__scs_magic() needs a &#39;void *&#39; variable, but a &#39;struct task_struct *&#39; is<br />
given. &#39;task_scs(tsk)&#39; is the starting address of the task&#39;s shadow call<br />
stack, and &#39;__scs_magic(task_scs(tsk))&#39; is the end address of the task&#39;s<br />
shadow call stack. Here should be &#39;__scs_magic(task_scs(tsk))&#39;.<br />
<br />
The user-visible effect of this bug is that when CONFIG_DEBUG_STACK_USAGE<br />
is enabled, the shadow call stack usage checking function<br />
(scs_check_usage) would scan an incorrect memory range. This could lead<br />
<br />
1. **Inaccurate stack usage reporting**: The function would calculate<br />
wrong usage statistics for the shadow call stack, potentially showing<br />
incorrect value in kmsg.<br />
<br />
2. **Potential kernel crash**: If the value of __scs_magic(tsk)is<br />
greater than that of __scs_magic(task_scs(tsk)), the for loop may<br />
access unmapped memory, potentially causing a kernel panic. However,<br />
this scenario is unlikely because task_struct is allocated via the slab<br />
allocator (which typically returns lower addresses), while the shadow<br />
call stack returned by task_scs(tsk) is allocated via vmalloc(which<br />
typically returns higher addresses).<br />
<br />
However, since this is purely a debugging feature<br />
(CONFIG_DEBUG_STACK_USAGE), normal production systems should be not<br />
unaffected. The bug only impacts developers and testers who are actively<br />
debugging stack usage with this configuration enabled.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/062774439d442882b44f5eab8c256ad3423ef284
- https://git.kernel.org/stable/c/08bd4c46d5e63b78e77f2605283874bbe868ab19
- https://git.kernel.org/stable/c/57ba40b001be27786d0570dd292289df748b306b
- https://git.kernel.org/stable/c/9ef28943471a16e4f9646bc3e8e2de148e7d8d7b
- https://git.kernel.org/stable/c/a19fb3611e4c06624fc0f83ef19f4fb8d57d4751



