We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-22048

LoongArch: BPF: Don't override subprog's return value



Description

In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Don't override subprog's return value The verifier test `calls: div by 0 in subprog` triggers a panic at the ld.bu instruction. The ld.bu insn is trying to load byte from memory address returned by the subprog. The subprog actually set the correct address at the a5 register (dedicated register for BPF return values). But at commit 73c359d1d356 ("LoongArch: BPF: Sign-extend return values") we also sign extended a5 to the a0 register (return value in LoongArch). For function call insn, we later propagate the a0 register back to a5 register. This is right for native calls but wrong for bpf2bpf calls which expect zero-extended return value in a5 register. So only move a0 to a5 for native calls (i.e. non-BPF_PSEUDO_CALL).

Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

0c8d50501bc13cacecc19caaddc10db372592a39 before 7df2696256a034405d3c5a71b3a4c54725de4404
affected

d5d83242a1d778ceb6d8b07c6b491cf7483ca112 before 223d565d8892481684091cfbaf3466f2b0e289d3
affected

73c359d1d356cf10236ccd358bd55edab33e9424 before 780628a780b622759d9e5adc76d15432144da1a3
affected

73c359d1d356cf10236ccd358bd55edab33e9424 before 996e90ab446641553e8e21707b38b9709605e0e0
affected

73c359d1d356cf10236ccd358bd55edab33e9424 before 60f3caff1492e5b8616b9578c4bedb5c0a88ed14
affected

8382e92f90b601acf6d426121e6f4991502e767d
affected

3b75f627b73d96787a493e2f1187543ba9c056a4
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.6.87
unaffected

6.12.23
unaffected

6.13.11
unaffected

6.14.2
unaffected

6.15
unaffected

References

git.kernel.org/...c/7df2696256a034405d3c5a71b3a4c54725de4404

git.kernel.org/...c/223d565d8892481684091cfbaf3466f2b0e289d3

git.kernel.org/...c/780628a780b622759d9e5adc76d15432144da1a3

git.kernel.org/...c/996e90ab446641553e8e21707b38b9709605e0e0

git.kernel.org/...c/60f3caff1492e5b8616b9578c4bedb5c0a88ed14

cve.org (CVE-2025-22048)

nvd.nist.gov (CVE-2025-22048)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-22048

Support options

Helpdesk Chat, Email, Knowledgebase