Description
In the Linux kernel, the following vulnerability has been resolved:

LoongArch: Enable exception fixup for specific ADE subcode

This patch allows the LoongArch BPF JIT to handle recoverable memory
access errors generated by BPF_PROBE_MEM* instructions.

When a BPF program performs memory access operations, the instructions
it executes may trigger ADEM exceptions. The kernel’s built-in BPF
exception table mechanism (EX_TYPE_BPF) will generate corresponding
exception fixup entries in the JIT compilation phase; however, the
architecture-specific trap handling function needs to proactively call
the common fixup routine to achieve exception recovery.

do_ade(): fix EX_TYPE_BPF memory access exceptions for BPF programs,
ensure safe execution.

Relevant test cases: illegal address access tests in module_attach and
subprogs_extable of selftests/bpf.
Published: 2026-03-18
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Kernel Crash (Denial of Service)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability concerns the LoongArch implementation of the BPF JIT compiler in the Linux kernel. It arises because the architecture‑specific trap handler did not invoke the common exception‑recovery routine for recoverable ADE (Access Denied Exception) faults triggered by BPF_PROBE_MEM* instructions. When such an exception occurs, the kernel fails to provide a fixup entry and the BPF program terminates the kernel, resulting in a crash and loss of service. This is an improper exception handling weakness.

Affected Systems

The flaw affects all Linux kernels that run on the LoongArch architecture and do not include the patch that enables the exception handler to call the fixup routine. The patch was merged into mainline, so any distribution shipping a LoongArch kernel before that merge remains vulnerable. Kernels updated with the patched code are not affected.

Risk and Exploitability

EPSS scores indicate a very low probability of exploitation (less than 1%) and the issue is not listed in CISA’s KEV catalog, suggesting limited attacker interest. The impact of a successful exploit is a kernel crash that results in a denial of service. The likely attack vector would be from an entity that can load BPF programs (root or a user with CAP_SYSADMIN). No documented network‑based exploitation method exists.

Generated by OpenCVE AI on March 27, 2026 at 10:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an updated LoongArch kernel that includes the BPF exception‑recovery patch.
  • If an upgrade cannot be performed immediately, restrict BPF program loading to trusted users or disable BPF functionality until a patch is available.

Generated by OpenCVE AI on March 27, 2026 at 10:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400
CWE-416

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-703

Thu, 26 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-703

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
CWE-755

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
CWE-755

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-754

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-754

Thu, 19 Mar 2026 17:30:00 +0000


Thu, 19 Mar 2026 12:15:00 +0000


Wed, 18 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: LoongArch: Enable exception fixup for specific ADE subcode This patch allows the LoongArch BPF JIT to handle recoverable memory access errors generated by BPF_PROBE_MEM* instructions. When a BPF program performs memory access operations, the instructions it executes may trigger ADEM exceptions. The kernel’s built-in BPF exception table mechanism (EX_TYPE_BPF) will generate corresponding exception fixup entries in the JIT compilation phase; however, the architecture-specific trap handling function needs to proactively call the common fixup routine to achieve exception recovery. do_ade(): fix EX_TYPE_BPF memory access exceptions for BPF programs, ensure safe execution. Relevant test cases: illegal address access tests in module_attach and subprogs_extable of selftests/bpf.
Title LoongArch: Enable exception fixup for specific ADE subcode
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-03-19T16:01:01.226Z

Reserved: 2026-03-17T09:08:18.458Z

Link: CVE-2025-71270

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-18T18:16:22.230

Modified: 2026-03-19T17:16:21.520

Link: CVE-2025-71270

cve-icon Redhat

Severity :

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2025-71270 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T15:48:25Z

Weaknesses