PT-2026-26113 · Linux · Linux
Published
2026-03-18
·
Updated
2026-03-18
·
CVE-2025-71270
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: Enable exception fixup for specific ADE subcode
This patch allows the LoongArch BPF JIT to handle recoverable memory
access errors generated by BPF PROBE MEM* instructions.
When a BPF program performs memory access operations, the instructions
it executes may trigger ADEM exceptions. The kernel’s built-in BPF
exception table mechanism (EX TYPE BPF) will generate corresponding
exception fixup entries in the JIT compilation phase; however, the
architecture-specific trap handling function needs to proactively call
the common fixup routine to achieve exception recovery.
do ade(): fix EX TYPE BPF memory access exceptions for BPF programs,
ensure safe execution.
Relevant test cases: illegal address access tests in module attach and
subprogs extable of selftests/bpf.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux