Impact
The vulnerability concerns the LoongArch implementation of the BPF JIT compiler in the Linux kernel. It arises because the architecture‑specific trap handler did not invoke the common exception‑recovery routine for recoverable ADE (Access Denied Exception) faults triggered by BPF_PROBE_MEM* instructions. When such an exception occurs, the kernel fails to provide a fixup entry and the BPF program terminates the kernel, resulting in a crash and loss of service. This is an improper exception handling weakness.
Affected Systems
The flaw affects all Linux kernels that run on the LoongArch architecture and do not include the patch that enables the exception handler to call the fixup routine. The patch was merged into mainline, so any distribution shipping a LoongArch kernel before that merge remains vulnerable. Kernels updated with the patched code are not affected.
Risk and Exploitability
EPSS scores indicate a very low probability of exploitation (less than 1%) and the issue is not listed in CISA’s KEV catalog, suggesting limited attacker interest. The impact of a successful exploit is a kernel crash that results in a denial of service. The likely attack vector would be from an entity that can load BPF programs (root or a user with CAP_SYSADMIN). No documented network‑based exploitation method exists.
OpenCVE Enrichment