{"id":"CVE-2025-71156","summary":"gve: defer interrupt enabling until NAPI registration","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ngve: defer interrupt enabling until NAPI registration\n\nCurrently, interrupts are automatically enabled immediately upon\nrequest. This allows interrupt to fire before the associated NAPI\ncontext is fully initialized and cause failures like below:\n\n[    0.946369] Call Trace:\n[    0.946369]  \u003cIRQ\u003e\n[    0.946369]  __napi_poll+0x2a/0x1e0\n[    0.946369]  net_rx_action+0x2f9/0x3f0\n[    0.946369]  handle_softirqs+0xd6/0x2c0\n[    0.946369]  ? handle_edge_irq+0xc1/0x1b0\n[    0.946369]  __irq_exit_rcu+0xc3/0xe0\n[    0.946369]  common_interrupt+0x81/0xa0\n[    0.946369]  \u003c/IRQ\u003e\n[    0.946369]  \u003cTASK\u003e\n[    0.946369]  asm_common_interrupt+0x22/0x40\n[    0.946369] RIP: 0010:pv_native_safe_halt+0xb/0x10\n\nUse the `IRQF_NO_AUTOEN` flag when requesting interrupts to prevent auto\nenablement and explicitly enable the interrupt in NAPI initialization\npath (and disable it during NAPI teardown).\n\nThis ensures that interrupt lifecycle is strictly coupled with\nreadiness of NAPI context.","modified":"2026-03-20T12:46:39.537992Z","published":"2026-01-23T14:25:55.456Z","related":["SUSE-SU-2026:0447-1","SUSE-SU-2026:0472-1","SUSE-SU-2026:0587-1","SUSE-SU-2026:20555-1","SUSE-SU-2026:20599-1","SUSE-SU-2026:20615-1","openSUSE-SU-2026:20287-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71156.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3d970eda003441f66551a91fda16478ac0711617"},{"type":"WEB","url":"https://git.kernel.org/stable/c/48f9277680925e1a8623d6b2c50aadb7af824ace"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f5b7f49bd2377916ad57cbd1210c61196daff013"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71156.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-71156"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1dfc2e46117e5c41037e27e859e75a7518881ee6"},{"fixed":"f5b7f49bd2377916ad57cbd1210c61196daff013"},{"fixed":"48f9277680925e1a8623d6b2c50aadb7af824ace"},{"fixed":"3d970eda003441f66551a91fda16478ac0711617"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71156.json"}}],"schema_version":"1.7.5"}