CVE-2025-71200

7 documents7 sources
Severity
5.5MEDIUM
EPSS
0.0%
top 96.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode When operating in HS200 or HS400 timing modes, reducing the clock frequency below 52MHz will lead to link broken as the Rockchip DWC MSHC controller requires maintaining a minimum clock of 52MHz in these modes. Add a check to prevent illegal clock reduction through debugfs: root@debian:/# echo 50000000 > /sys/kernel/debug/mmc0/clock root@debian:/# [ 3

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.06.1.162+4
CVEListV5linux/linuxc6f361cba51c536e7a6af31973c6a4e5d7e4e2e459b8a1ca6df4db2ca250e9eeab74e2b0068d69e9+5
Debianlinux< 6.1.162-1+2

Patches

🔴Vulnerability Details

3
CVEList
mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode2026-02-14
OSV
CVE-2025-71200: In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode When op2026-02-14
GHSA
GHSA-5ggv-7qrf-gvxf: In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode When2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode2026-02-14
Debian
CVE-2025-71200: linux - In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-71200 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-71200 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io