CVE-2025-71270
Received Received - Intake
Memory Access Exception Handling Flaw in Linux LoongArch BPF JIT

Publication date: 2026-03-18

Last updated on: 2026-03-19

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: LoongArch: Enable exception fixup for specific ADE subcode This patch allows the LoongArch BPF JIT to handle recoverable memory access errors generated by BPF_PROBE_MEM* instructions. When a BPF program performs memory access operations, the instructions it executes may trigger ADEM exceptions. The kernel’s built-in BPF exception table mechanism (EX_TYPE_BPF) will generate corresponding exception fixup entries in the JIT compilation phase; however, the architecture-specific trap handling function needs to proactively call the common fixup routine to achieve exception recovery. do_ade(): fix EX_TYPE_BPF memory access exceptions for BPF programs, ensure safe execution. Relevant test cases: illegal address access tests in module_attach and subprogs_extable of selftests/bpf.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-18
Last Modified
2026-03-19
Generated
2026-05-06
AI Q&A
2026-03-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability relates to the Linux kernel's handling of memory access errors in BPF (Berkeley Packet Filter) programs on the LoongArch architecture. Specifically, it involves the BPF JIT (Just-In-Time) compiler's ability to manage recoverable memory access errors triggered by BPF_PROBE_MEM* instructions. The kernel's exception table mechanism generates fixup entries during JIT compilation, but the architecture-specific trap handler must call a common fixup routine to properly recover from these exceptions. The vulnerability was fixed by enabling this exception fixup for specific ADE subcodes, ensuring safe execution of BPF programs.


How can this vulnerability impact me? :

If unpatched, this vulnerability could cause BPF programs on LoongArch systems to improperly handle memory access errors, potentially leading to unsafe execution or crashes. This could affect system stability or security when running BPF programs that perform memory access operations, as the kernel might not correctly recover from certain exceptions.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart