CVE-2025-71270
Memory Access Exception Handling Flaw in Linux LoongArch BPF JIT
Publication date: 2026-03-18
Last updated on: 2026-03-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability relates to the Linux kernel's handling of memory access errors in BPF (Berkeley Packet Filter) programs on the LoongArch architecture. Specifically, it involves the BPF JIT (Just-In-Time) compiler's ability to manage recoverable memory access errors triggered by BPF_PROBE_MEM* instructions. The kernel's exception table mechanism generates fixup entries during JIT compilation, but the architecture-specific trap handler must call a common fixup routine to properly recover from these exceptions. The vulnerability was fixed by enabling this exception fixup for specific ADE subcodes, ensuring safe execution of BPF programs.
How can this vulnerability impact me? :
If unpatched, this vulnerability could cause BPF programs on LoongArch systems to improperly handle memory access errors, potentially leading to unsafe execution or crashes. This could affect system stability or security when running BPF programs that perform memory access operations, as the kernel might not correctly recover from certain exceptions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know