CVE-2025-71140 — Linux vulnerability
14 documents7 sources
Severity
6.4MEDIUM
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 14
Latest updateApr 17
Description
In the Linux kernel, the following vulnerability has been resolved:
media: mediatek: vcodec: Use spinlock for context list protection lock
Previously a mutex was added to protect the encoder and decoder context
lists from unexpected changes originating from the SCP IP block, causing
the context pointer to go invalid, resulting in a NULL pointer
dereference in the IPI handler.
Turns out on the MT8173, the VPU IPI handler is called from hard IRQ
context. This causes a big warning from the sched…
Affected Packages14 packages
▶CVEListV5linux/linux0a2dc707aa42214f9c4827bd57e344e29a0841d6 — 2c1ea6214827041f548279c9eda341eda0cc8351+7
🔴Vulnerability Details
3GHSA▶
GHSA-fmmj-6v74-3cm2: In the Linux kernel, the following vulnerability has been resolved:
media: mediatek: vcodec: Use spinlock for context list protection lock
Previousl↗2026-01-14
OSV▶
CVE-2025-71140: In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: Use spinlock for context list protection lock Previously↗2026-01-14