Home

Description

In the Linux kernel, the following vulnerability has been resolved: um: init cpu_tasks[] earlier This is currently done in uml_finishsetup(), but e.g. with KCOV enabled we'll crash because some init code can call into e.g. memparse(), which has coverage annotations, and then the checks in check_kcov_mode() crash because current is NULL. Simply initialize the cpu_tasks[] array statically, which fixes the crash. For the later SMP work, it seems to have not really caused any problems yet, but initialize all of the entries anyway.

PUBLISHED Reserved 2026-01-13 | Published 2026-01-14 | Updated 2026-02-09 | Assigner Linux

Product status

Default status
unaffected

2f681ba4b352cdd5658ed2a96062375a12839755 (git) before dbbf6d47130674640cd12a0781a0fb2a575d0e44
affected

2f681ba4b352cdd5658ed2a96062375a12839755 (git) before 7b5d4416964c07c902163822a30a622111172b01
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.18.3 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/dbbf6d47130674640cd12a0781a0fb2a575d0e44

git.kernel.org/...c/7b5d4416964c07c902163822a30a622111172b01

cve.org (CVE-2025-71115)

nvd.nist.gov (CVE-2025-71115)

Download JSON