CVE-2025-71121 (GCVE-0-2025-71121)
Vulnerability from cvelistv5
Published
2026-01-14 15:06
Modified
2026-02-09 08:35
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: parisc: Do not reprogram affinitiy on ASP chip The ASP chip is a very old variant of the GSP chip and is used e.g. in HP 730 workstations. When trying to reprogram the affinity it will crash with a HPMC as the relevant registers don't seem to be at the usual location. Let's avoid the crash by checking the sversion. Also note, that reprogramming isn't necessary either, as the HP730 is a just a single-CPU machine.
Impacted products
Vendor Product Version
Linux Linux Version: f7c35220305f273bddc0bdaf1e453b4ca280f145
Version: f77f482ec31a1f38eb38079622ca367b4b7d7442
Version: 939fc856676c266c3bc347c1c1661872a3725c0f
Version: 939fc856676c266c3bc347c1c1661872a3725c0f
Version: 939fc856676c266c3bc347c1c1661872a3725c0f
Version: 939fc856676c266c3bc347c1c1661872a3725c0f
Version: 939fc856676c266c3bc347c1c1661872a3725c0f
Version: 52b66c46bb9f5fb270673327c41dec50171939c1
Version: 3940ecfccfffec8385b64551fd73a12c02049437
Version: bab8e3b4f68ac393c42da73d0bce891d281ded55
Version: ff342de194ad311f905ce0b6b73db48db802e224
Version: ef24e0a68b59ea8f59fedf5a9881fd9cf9f27370
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/parisc/gsc.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "845a92b74cf7a730200532ecb4482981cec9d006",
              "status": "affected",
              "version": "f7c35220305f273bddc0bdaf1e453b4ca280f145",
              "versionType": "git"
            },
            {
              "lessThan": "7a146f34e5be96330467397c9fd9d3d851b2cbbe",
              "status": "affected",
              "version": "f77f482ec31a1f38eb38079622ca367b4b7d7442",
              "versionType": "git"
            },
            {
              "lessThan": "4d0858bbeea12a50bfb32137f74d4b74917ebadd",
              "status": "affected",
              "version": "939fc856676c266c3bc347c1c1661872a3725c0f",
              "versionType": "git"
            },
            {
              "lessThan": "e09fd2eb6d4c993ee9eaae556cb51e30ec1042df",
              "status": "affected",
              "version": "939fc856676c266c3bc347c1c1661872a3725c0f",
              "versionType": "git"
            },
            {
              "lessThan": "60560d13ff368415c96a0c1247bea16d427c0641",
              "status": "affected",
              "version": "939fc856676c266c3bc347c1c1661872a3725c0f",
              "versionType": "git"
            },
            {
              "lessThan": "c8f810e20f4bbe50b49f73429d9fa6efad00623e",
              "status": "affected",
              "version": "939fc856676c266c3bc347c1c1661872a3725c0f",
              "versionType": "git"
            },
            {
              "lessThan": "dca7da244349eef4d78527cafc0bf80816b261f5",
              "status": "affected",
              "version": "939fc856676c266c3bc347c1c1661872a3725c0f",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "52b66c46bb9f5fb270673327c41dec50171939c1",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "3940ecfccfffec8385b64551fd73a12c02049437",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "bab8e3b4f68ac393c42da73d0bce891d281ded55",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "ff342de194ad311f905ce0b6b73db48db802e224",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "ef24e0a68b59ea8f59fedf5a9881fd9cf9f27370",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/parisc/gsc.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.18"
            },
            {
              "lessThan": "5.18",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.248",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.198",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.160",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.120",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.64",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.18.*",
              "status": "unaffected",
              "version": "6.18.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.19",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.248",
                  "versionStartIncluding": "5.10.111",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.198",
                  "versionStartIncluding": "5.15.34",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.160",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.120",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.64",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.3",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.14.276",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.19.238",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.4.189",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.16.20",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.17.3",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nparisc: Do not reprogram affinitiy on ASP chip\n\nThe ASP chip is a very old variant of the GSP chip and is used e.g. in\nHP 730 workstations. When trying to reprogram the affinity it will crash\nwith a HPMC as the relevant registers don\u0027t seem to be at the usual\nlocation.  Let\u0027s avoid the crash by checking the sversion. Also note,\nthat reprogramming isn\u0027t necessary either, as the HP730 is a just a\nsingle-CPU machine."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T08:35:16.277Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/845a92b74cf7a730200532ecb4482981cec9d006"
        },
        {
          "url": "https://git.kernel.org/stable/c/7a146f34e5be96330467397c9fd9d3d851b2cbbe"
        },
        {
          "url": "https://git.kernel.org/stable/c/4d0858bbeea12a50bfb32137f74d4b74917ebadd"
        },
        {
          "url": "https://git.kernel.org/stable/c/e09fd2eb6d4c993ee9eaae556cb51e30ec1042df"
        },
        {
          "url": "https://git.kernel.org/stable/c/60560d13ff368415c96a0c1247bea16d427c0641"
        },
        {
          "url": "https://git.kernel.org/stable/c/c8f810e20f4bbe50b49f73429d9fa6efad00623e"
        },
        {
          "url": "https://git.kernel.org/stable/c/dca7da244349eef4d78527cafc0bf80816b261f5"
        }
      ],
      "title": "parisc: Do not reprogram affinitiy on ASP chip",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-71121",
    "datePublished": "2026-01-14T15:06:07.871Z",
    "dateReserved": "2026-01-13T15:30:19.654Z",
    "dateUpdated": "2026-02-09T08:35:16.277Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…