Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign extend kfunc call arguments The kfunc calls are native calls so they should follow LoongArch calling conventions. Sign extend its arguments properly to avoid kernel panic. This is done by adding a new emit_abi_ext() helper. The emit_abi_ext() helper performs extension in place meaning a value already store in the target register (Note: this is different from the existing sign_extend() helper and thus we can't reuse it).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.1.1, < 6.6.120 |
References
- https://git.kernel.org/stable/c/0d666db731e95890e0eda7ea61bc925fd2be90c6Patch
- https://git.kernel.org/stable/c/321993a874f571a94b5a596f1132f798c663b56ePatch
- https://git.kernel.org/stable/c/3f5a238f24d7b75f9efe324d3539ad388f58536ePatch
- https://git.kernel.org/stable/c/fd43edf357a3a1f5ed1c4bf450b60001c9091c39Patch
FAQ
What is CVE-2025-71129?
CVE-2025-71129 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign extend kfunc call arguments The kfunc calls are native calls so they should follow LoongArch calling conventi...
How severe is CVE-2025-71129?
CVE-2025-71129 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-71129?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.