PT-2026-26113 · Linux · Linux

Published

2026-03-18

·

Updated

2026-03-18

·

CVE-2025-71270

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: Enable exception fixup for specific ADE subcode
This patch allows the LoongArch BPF JIT to handle recoverable memory access errors generated by BPF PROBE MEM* instructions.
When a BPF program performs memory access operations, the instructions it executes may trigger ADEM exceptions. The kernel’s built-in BPF exception table mechanism (EX TYPE BPF) will generate corresponding exception fixup entries in the JIT compilation phase; however, the architecture-specific trap handling function needs to proactively call the common fixup routine to achieve exception recovery.
do ade(): fix EX TYPE BPF memory access exceptions for BPF programs, ensure safe execution.
Relevant test cases: illegal address access tests in module attach and subprogs extable of selftests/bpf.

Related Identifiers

CVE-2025-71270

Affected Products

Linux