CVE-2025-71129Linux vulnerability

7 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 14

Description

In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign extend kfunc call arguments The kfunc calls are native calls so they should follow LoongArch calling conventions. Sign extend its arguments properly to avoid kernel panic. This is done by adding a new emit_abi_ext() helper. The emit_abi_ext() helper performs extension in place meaning a value already store in the target register (Note: this is different from the existing sign_extend() helper and thus we ca

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

Linuxlinux/linux_kernel6.1.06.6.120+2
NVDlinux/linux_kernel6.1.16.6.120+4
Debianlinux/linux_kernel< 6.12.69-1+1
CVEListV5linux/linux5dc615520c4dfb358245680f1904bad61116648efd43edf357a3a1f5ed1c4bf450b60001c9091c39+4
debiandebian/linux< linux 6.18.5-1 (forky)

Patches

🔴Vulnerability Details

3
GHSA
GHSA-6c2w-77g9-cccc: In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign extend kfunc call arguments The kfunc calls are native call2026-01-14
OSV
LoongArch: BPF: Sign extend kfunc call arguments2026-01-14
OSV
CVE-2025-71129: In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign extend kfunc call arguments The kfunc calls are native calls2026-01-14

📋Vendor Advisories

2
Red Hat
kernel: LoongArch: BPF: Sign extend kfunc call arguments2026-01-14
Debian
CVE-2025-71129: linux - In the Linux kernel, the following vulnerability has been resolved: LoongArch: ...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-71129 Impact, Exploitability, and Mitigation Steps | Wiz