CVE-2025-71129 (GCVE-0-2025-71129)
Vulnerability from cvelistv5 – Published: 2026-01-14 15:07 – Updated: 2026-01-14 15:07
VLAI?
Title
LoongArch: BPF: Sign extend kfunc call arguments
Summary
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: BPF: Sign extend kfunc call arguments
The kfunc calls are native calls so they should follow LoongArch calling
conventions. Sign extend its arguments properly to avoid kernel panic.
This is done by adding a new emit_abi_ext() helper. The emit_abi_ext()
helper performs extension in place meaning a value already store in the
target register (Note: this is different from the existing sign_extend()
helper and thus we can't reuse it).
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
5dc615520c4dfb358245680f1904bad61116648e , < fd43edf357a3a1f5ed1c4bf450b60001c9091c39
(git)
Affected: 5dc615520c4dfb358245680f1904bad61116648e , < 0d666db731e95890e0eda7ea61bc925fd2be90c6 (git) Affected: 5dc615520c4dfb358245680f1904bad61116648e , < 321993a874f571a94b5a596f1132f798c663b56e (git) Affected: 5dc615520c4dfb358245680f1904bad61116648e , < 3f5a238f24d7b75f9efe324d3539ad388f58536e (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"arch/loongarch/net/bpf_jit.c",
"arch/loongarch/net/bpf_jit.h"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "fd43edf357a3a1f5ed1c4bf450b60001c9091c39",
"status": "affected",
"version": "5dc615520c4dfb358245680f1904bad61116648e",
"versionType": "git"
},
{
"lessThan": "0d666db731e95890e0eda7ea61bc925fd2be90c6",
"status": "affected",
"version": "5dc615520c4dfb358245680f1904bad61116648e",
"versionType": "git"
},
{
"lessThan": "321993a874f571a94b5a596f1132f798c663b56e",
"status": "affected",
"version": "5dc615520c4dfb358245680f1904bad61116648e",
"versionType": "git"
},
{
"lessThan": "3f5a238f24d7b75f9efe324d3539ad388f58536e",
"status": "affected",
"version": "5dc615520c4dfb358245680f1904bad61116648e",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"arch/loongarch/net/bpf_jit.c",
"arch/loongarch/net/bpf_jit.h"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.1"
},
{
"lessThan": "6.1",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.120",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.64",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.19-rc4",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.120",
"versionStartIncluding": "6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.64",
"versionStartIncluding": "6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.4",
"versionStartIncluding": "6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19-rc4",
"versionStartIncluding": "6.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: BPF: Sign extend kfunc call arguments\n\nThe kfunc calls are native calls so they should follow LoongArch calling\nconventions. Sign extend its arguments properly to avoid kernel panic.\nThis is done by adding a new emit_abi_ext() helper. The emit_abi_ext()\nhelper performs extension in place meaning a value already store in the\ntarget register (Note: this is different from the existing sign_extend()\nhelper and thus we can\u0027t reuse it)."
}
],
"providerMetadata": {
"dateUpdated": "2026-01-14T15:07:45.786Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/fd43edf357a3a1f5ed1c4bf450b60001c9091c39"
},
{
"url": "https://git.kernel.org/stable/c/0d666db731e95890e0eda7ea61bc925fd2be90c6"
},
{
"url": "https://git.kernel.org/stable/c/321993a874f571a94b5a596f1132f798c663b56e"
},
{
"url": "https://git.kernel.org/stable/c/3f5a238f24d7b75f9efe324d3539ad388f58536e"
}
],
"title": "LoongArch: BPF: Sign extend kfunc call arguments",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-71129",
"datePublished": "2026-01-14T15:07:45.786Z",
"dateReserved": "2026-01-13T15:30:19.655Z",
"dateUpdated": "2026-01-14T15:07:45.786Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-71129\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-01-14T15:16:02.647\",\"lastModified\":\"2026-01-14T16:25:12.057\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nLoongArch: BPF: Sign extend kfunc call arguments\\n\\nThe kfunc calls are native calls so they should follow LoongArch calling\\nconventions. Sign extend its arguments properly to avoid kernel panic.\\nThis is done by adding a new emit_abi_ext() helper. The emit_abi_ext()\\nhelper performs extension in place meaning a value already store in the\\ntarget register (Note: this is different from the existing sign_extend()\\nhelper and thus we can\u0027t reuse it).\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0d666db731e95890e0eda7ea61bc925fd2be90c6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/321993a874f571a94b5a596f1132f798c663b56e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3f5a238f24d7b75f9efe324d3539ad388f58536e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fd43edf357a3a1f5ed1c4bf450b60001c9091c39\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…