CVE-2025-71270

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/03/2026
Last modified:
19/03/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> LoongArch: Enable exception fixup for specific ADE subcode<br /> <br /> This patch allows the LoongArch BPF JIT to handle recoverable memory<br /> access errors generated by BPF_PROBE_MEM* instructions.<br /> <br /> When a BPF program performs memory access operations, the instructions<br /> it executes may trigger ADEM exceptions. The kernel’s built-in BPF<br /> exception table mechanism (EX_TYPE_BPF) will generate corresponding<br /> exception fixup entries in the JIT compilation phase; however, the<br /> architecture-specific trap handling function needs to proactively call<br /> the common fixup routine to achieve exception recovery.<br /> <br /> do_ade(): fix EX_TYPE_BPF memory access exceptions for BPF programs,<br /> ensure safe execution.<br /> <br /> Relevant test cases: illegal address access tests in module_attach and<br /> subprogs_extable of selftests/bpf.

Impact