The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-71080

CVE-2025-71080: Linux Kernel Race Condition Vulnerability

CVE-2025-71080 is a race condition flaw in the Linux kernel's IPv6 routing that triggers a BUG on PREEMPT_RT systems. This article covers the technical details, affected versions, security impact, and mitigation strategies.

Updated: January 22, 2026

CVE-2025-71080 Overview

A race condition vulnerability has been identified in the Linux kernel's IPv6 routing subsystem. The vulnerability exists in the rt6_get_pcpu_route() function when running on PREEMPT_RT (Real-Time) kernels. When the function returns NULL, the current task can be preempted, allowing another task on the same CPU to execute rt6_make_pcpu_route() and install a pcpu_rt entry. When the original task resumes, its cmpxchg() operation fails because rt6i_pcpu is no longer NULL, triggering a BUG_ON(prev) condition.

Critical Impact

This vulnerability can cause kernel crashes via BUG_ON assertions on PREEMPT_RT Linux kernels, leading to denial of service conditions affecting system availability.

Affected Products

  • Linux kernel with PREEMPT_RT configuration enabled
  • Linux kernel IPv6 networking subsystem
  • Systems utilizing per-CPU routing optimizations

Discovery Timeline

  • 2026-01-13 - CVE CVE-2025-71080 published to NVD
  • 2026-01-13 - Last updated in NVD database

Technical Details for CVE-2025-71080

Vulnerability Analysis

This vulnerability represents a classic race condition scenario specific to real-time preemption kernels. The core issue stems from a timing window between checking a per-CPU route entry and creating a new one. In standard kernel configurations, this race condition is unlikely due to the execution context, but PREEMPT_RT kernels allow preemption at more points, exposing this vulnerability.

The race window occurs in the following sequence: when rt6_get_pcpu_route() returns NULL indicating no per-CPU route exists, the kernel proceeds to allocate and install a new route via rt6_make_pcpu_route(). However, under PREEMPT_RT, another task can be scheduled on the same CPU during this window, complete its own route installation, and modify the rt6i_pcpu pointer. When the first task resumes and attempts its cmpxchg() operation, it unexpectedly fails because the value has changed, hitting the BUG_ON assertion.

The vulnerability is reproducible by artificially widening the race window using mdelay() after rt6_get_pcpu_route().

Root Cause

The root cause is the assumption that rt6i_pcpu cannot change between the NULL check in rt6_get_pcpu_route() and the cmpxchg() in rt6_make_pcpu_route(). This assumption holds in non-PREEMPT_RT kernels where the execution context prevents preemption, but fails under PREEMPT_RT due to its more aggressive preemption model. Using preempt_disable/enable to protect this critical section is not viable because ip6_rt_pcpu_alloc() may sleep, which is incompatible with disabled preemption.

Attack Vector

An attacker with local access to a PREEMPT_RT Linux system could potentially trigger this race condition to cause kernel panics and denial of service. The attack requires:

  1. A system running a Linux kernel with PREEMPT_RT configuration
  2. The ability to generate IPv6 traffic that triggers per-CPU route allocation
  3. Timing conditions that cause multiple tasks to race on route installation

While exploitation requires specific kernel configuration and timing, the vulnerability can lead to system instability and crashes in production real-time environments.

Detection Methods for CVE-2025-71080

Indicators of Compromise

  • Kernel panic messages containing BUG_ON assertions in rt6_make_pcpu_route() or related IPv6 routing functions
  • System crashes or unexpected reboots on PREEMPT_RT kernels during IPv6 network activity
  • Kernel oops logs referencing rt6_get_pcpu_route or rt6i_pcpu in the stack trace

Detection Strategies

  • Monitor system logs for kernel BUG or panic messages related to IPv6 routing subsystem components
  • Implement kernel crash dump analysis to identify instances of this specific race condition
  • Use kernel tracing tools (ftrace, eBPF) to monitor rt6_get_pcpu_route() and rt6_make_pcpu_route() execution patterns on PREEMPT_RT systems

Monitoring Recommendations

  • Configure kdump or crash collection tools to capture kernel crash information for post-incident analysis
  • Enable kernel address sanitizer (KASAN) and kernel concurrency sanitizer (KCSAN) in development environments to detect race conditions
  • Monitor for unusual patterns in IPv6 routing behavior or unexpected per-CPU route allocation failures

How to Mitigate CVE-2025-71080

Immediate Actions Required

  • Update affected Linux kernels to versions containing the fix (commits 1adaea5, 1dc33ad, or 787515c)
  • If immediate patching is not possible, consider temporarily disabling PREEMPT_RT configuration on affected systems if real-time requirements permit
  • Monitor production systems for kernel crashes related to IPv6 routing

Patch Information

The fix has been committed to the Linux kernel stable branches. The patch modifies the behavior to gracefully handle cmpxchg() failures on PREEMPT_RT kernels by freeing the local allocation and returning the existing pcpu_rt installed by another task. For non-PREEMPT_RT kernels, the BUG_ON is replaced with WARN_ON_ONCE to avoid crashes while still alerting to unexpected races.

Patches are available from:

  • Kernel Git Commit 1adaea5
  • Kernel Git Commit 1dc33ad
  • Kernel Git Commit 787515c

Workarounds

  • Disable PREEMPT_RT kernel configuration temporarily if the real-time preemption feature is not critical for your workload
  • Reduce IPv6 routing activity on affected systems until patches can be applied
  • Consider using IPv4-only networking temporarily on critical PREEMPT_RT systems pending kernel updates
bash
# Check if your kernel has PREEMPT_RT enabled
uname -a | grep -i rt
cat /proc/version | grep -i preempt

# Check kernel configuration (if available)
zcat /proc/config.gz 2>/dev/null | grep PREEMPT_RT || \
cat /boot/config-$(uname -r) 2>/dev/null | grep PREEMPT_RT

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRace Condition

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Git Commit 1adaea5

  • Kernel Git Commit 1dc33ad

  • Kernel Git Commit 787515c
  • Related CVEs
  • CVE-2026-23440: Linux Kernel Race Condition Vulnerability

  • CVE-2026-23434: Linux Kernel Race Condition Vulnerability

  • CVE-2026-23436: Linux Kernel Race Condition Vulnerability

  • CVE-2026-23463: Linux Kernel QBMAN Race Condition Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English