CVE-2025-71270
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/03/2026
Last modified:
19/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
LoongArch: Enable exception fixup for specific ADE subcode<br />
<br />
This patch allows the LoongArch BPF JIT to handle recoverable memory<br />
access errors generated by BPF_PROBE_MEM* instructions.<br />
<br />
When a BPF program performs memory access operations, the instructions<br />
it executes may trigger ADEM exceptions. The kernel’s built-in BPF<br />
exception table mechanism (EX_TYPE_BPF) will generate corresponding<br />
exception fixup entries in the JIT compilation phase; however, the<br />
architecture-specific trap handling function needs to proactively call<br />
the common fixup routine to achieve exception recovery.<br />
<br />
do_ade(): fix EX_TYPE_BPF memory access exceptions for BPF programs,<br />
ensure safe execution.<br />
<br />
Relevant test cases: illegal address access tests in module_attach and<br />
subprogs_extable of selftests/bpf.



