CVE-2025-68216Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 16

Description

In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Disable trampoline for kernel module function trace The current LoongArch BPF trampoline implementation is incompatible with tracing functions in kernel modules. This causes several severe and user-visible problems: * The `bpf_selftests/module_attach` test fails consistently. * Kernel lockup when a BPF program is attached to a module function [1]. * Critical kernel modules like WireGuard experience traffic dis

Affected Packages4 packages

Linuxlinux/linux_kernel6.17.06.17.10
Debianlinux/linux_kernel< 6.17.10-1
CVEListV5linux/linuxf9b6b41f0cf31791541cea9644ddbedb4646580144eb3849378be5f72b8be03edbacbdcd6f5eade4+2
debiandebian/linux< linux 6.17.10-1 (forky)

🔴Vulnerability Details

3
GHSA
GHSA-gvc4-65gw-vx8r: In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Disable trampoline for kernel module function trace The current2025-12-16
OSV
CVE-2025-68216: In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Disable trampoline for kernel module function trace The current Lo2025-12-16
OSV
LoongArch: BPF: Disable trampoline for kernel module function trace2025-12-16

📋Vendor Advisories

2
Red Hat
kernel: LoongArch: BPF: Disable trampoline for kernel module function trace2025-12-16
Debian
CVE-2025-68216: linux - In the Linux kernel, the following vulnerability has been resolved: LoongArch: ...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-68216 Impact, Exploitability, and Mitigation Steps | Wiz