CVE-2025-71270
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: Enable exception fixup for specific ADE subcode
This patch allows the LoongArch BPF JIT to handle recoverable memory
access errors generated by BPF_PROBE_MEM* instructions.
When a BPF program performs memory access operations, the instructions
it executes may trigger ADEM exceptions. The kernel’s built-in BPF
exception table mechanism (EX_TYPE_BPF) will generate corresponding
exception fixup entries in the JIT compilation phase; however, the
architecture-specific trap handling function needs to proactively call
the common fixup routine to achieve exception recovery.
do_ade(): fix EX_TYPE_BPF memory access exceptions for BPF programs,
ensure safe execution.
Relevant test cases: illegal address access tests in module_attach and
subprogs_extable of selftests/bpf.
https://nvd.nist.gov/vuln/detail/CVE-2025-71270
Categories
No category defined
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67
AFFECTED (from MITRE)
| Vendor |
Product |
Versions |
| Linux |
Linux |
- dbcd7f5fafea64dbe588c4ec18bc309fde5d1e1c < 73ede654d9daa2ee41bdd17bc62946fc5a0258cb [affected]
- dbcd7f5fafea64dbe588c4ec18bc309fde5d1e1c < c49a28068363f3dca439aa5fe4d3b1f8159809fe [affected]
- dbcd7f5fafea64dbe588c4ec18bc309fde5d1e1c < c2ed4f71e9288f21d5c53ff790270758e60fa5f9 [affected]
- dbcd7f5fafea64dbe588c4ec18bc309fde5d1e1c < 9bdc1ab5e4ce6f066119018d8f69631a46f9c5a0 [affected]
|
| Linux |
Linux |
- 6.2 [affected]
- < 6.2 [unaffected]
- 6.6.124 ≤ 6.6.* [unaffected]
- 6.12.70 ≤ 6.12.* [unaffected]
- 6.18.10 ≤ 6.18.* [unaffected]
- 6.19 ≤ * [unaffected]
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
CPE
| cpe |
start |
end |
| Configuration 1 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.2 |
< 6.6.124 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.2 |
< 6.12.70 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.2 |
< 6.18.10 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.2 |
< 6.19 |
REMEDIATION
EXPLOITS
Exploit-db.com
| id |
description |
date |
|
| No known exploits |
POC Github
Other Nist (github, ...)
CAPEC
Common Attack Pattern Enumerations and Classifications
| id |
description |
severity |
| No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
Discover this offer