CVE-2025-68216
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the LoongArch architecture in the Linux kernel's BPF (Berkeley Packet Filter) trampoline implementation. The trampoline feature, which is used for tracing kernel module functions, is incompatible with kernel modules on LoongArch. This incompatibility causes severe issues such as test failures, kernel lockups when attaching BPF programs to module functions, and disruption of critical kernel modules like WireGuard when their functions are traced. To mitigate these problems, the feature has been disabled temporarily until a proper fix is developed.
How can this vulnerability impact me? :
If you are using the LoongArch architecture with the Linux kernel, this vulnerability can cause serious problems including kernel lockups when BPF programs are attached to kernel module functions, failure of BPF self-tests, and disruption of important kernel modules such as WireGuard, which may lead to network traffic interruptions. These issues can affect system stability and the functionality of critical services relying on kernel modules.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by running the BPF selftests, specifically the module_attach test, which fails consistently if the vulnerability is present. You can use the command: ./test_progs -a module_attach -v. The test output will show failures such as 'libbpf: prog 'handle_fentry': failed to attach: -ENOTSUPP' and 'test_module_attach:FAIL:skel_attach skeleton attach failed: -524', indicating the presence of the issue.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to disable the BPF trampoline feature for kernel module function tracing on LoongArch architectures. This is the approach taken by the patch that prevents the BPF subsystem from allowing trampoline attachments to kernel module functions. Until a proper fix is implemented, disabling this feature avoids kernel lockups and traffic disruptions in critical modules like WireGuard.