cve-2025-37893
Vulnerability from cvelistv5
Published
2025-04-18 07:01
Modified
2025-04-25 10:06
Severity ?
EPSS score ?
Summary
LoongArch: BPF: Fix off-by-one error in build_prologue()
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/loongarch/net/bpf_jit.c", "arch/loongarch/net/bpf_jit.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "b3ffad2f02db4aace6799fe0049508b8925eae45", "status": "affected", "version": "5dc615520c4dfb358245680f1904bad61116648e", "versionType": "git" }, { "lessThan": "205a2182c51ffebaef54d643e3745e720cded08b", "status": "affected", "version": "5dc615520c4dfb358245680f1904bad61116648e", "versionType": "git" }, { "lessThan": "c74d95a5679741ef428974ab788f5b0758dc78ae", "status": "affected", "version": "5dc615520c4dfb358245680f1904bad61116648e", "versionType": "git" }, { "lessThan": "48b904de2408af5f936f0e03f48dfcddeab58aa0", "status": "affected", "version": "5dc615520c4dfb358245680f1904bad61116648e", "versionType": "git" }, { "lessThan": "7e2586991e36663c9bc48c828b83eab180ad30a9", "status": "affected", "version": "5dc615520c4dfb358245680f1904bad61116648e", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/loongarch/net/bpf_jit.c", "arch/loongarch/net/bpf_jit.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.1" }, { "lessThan": "6.1", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.87", "versionType": "semver" }, { "lessThanOrEqual": "6.12.*", "status": "unaffected", "version": "6.12.23", "versionType": "semver" }, { "lessThanOrEqual": "6.13.*", "status": "unaffected", "version": "6.13.11", "versionType": "semver" }, { "lessThanOrEqual": "6.14.*", "status": "unaffected", "version": "6.14.2", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.15-rc1", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: BPF: Fix off-by-one error in build_prologue()\n\nVincent reported that running BPF progs with tailcalls on LoongArch\ncauses kernel hard lockup. Debugging the issues shows that the JITed\nimage missing a jirl instruction at the end of the epilogue.\n\nThere are two passes in JIT compiling, the first pass set the flags and\nthe second pass generates JIT code based on those flags. With BPF progs\nmixing bpf2bpf and tailcalls, build_prologue() generates N insns in the\nfirst pass and then generates N+1 insns in the second pass. This makes\nepilogue_offset off by one and we will jump to some unexpected insn and\ncause lockup. Fix this by inserting a nop insn." } ], "providerMetadata": { "dateUpdated": "2025-04-25T10:06:50.345Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/b3ffad2f02db4aace6799fe0049508b8925eae45" }, { "url": "https://git.kernel.org/stable/c/205a2182c51ffebaef54d643e3745e720cded08b" }, { "url": "https://git.kernel.org/stable/c/c74d95a5679741ef428974ab788f5b0758dc78ae" }, { "url": "https://git.kernel.org/stable/c/48b904de2408af5f936f0e03f48dfcddeab58aa0" }, { "url": "https://git.kernel.org/stable/c/7e2586991e36663c9bc48c828b83eab180ad30a9" } ], "title": "LoongArch: BPF: Fix off-by-one error in build_prologue()", "x_generator": { "engine": "bippy-1.1.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2025-37893", "datePublished": "2025-04-18T07:01:28.856Z", "dateReserved": "2025-04-16T04:51:23.964Z", "dateUpdated": "2025-04-25T10:06:50.345Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-37893\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-04-18T07:15:42.983\",\"lastModified\":\"2025-04-29T16:54:26.433\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nLoongArch: BPF: Fix off-by-one error in build_prologue()\\n\\nVincent reported that running BPF progs with tailcalls on LoongArch\\ncauses kernel hard lockup. Debugging the issues shows that the JITed\\nimage missing a jirl instruction at the end of the epilogue.\\n\\nThere are two passes in JIT compiling, the first pass set the flags and\\nthe second pass generates JIT code based on those flags. With BPF progs\\nmixing bpf2bpf and tailcalls, build_prologue() generates N insns in the\\nfirst pass and then generates N+1 insns in the second pass. This makes\\nepilogue_offset off by one and we will jump to some unexpected insn and\\ncause lockup. Fix this by inserting a nop insn.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: LoongArch: BPF: Correcci\u00f3n de error de uno en build_prologue() Vincent inform\u00f3 que ejecutar programas BPF con llamadas de cola en LoongArch provoca un bloqueo duro del kernel. La depuraci\u00f3n de los problemas muestra que a la imagen JIT le falta una instrucci\u00f3n jirl al final del ep\u00edlogo. Hay dos pasos en la compilaci\u00f3n JIT, el primer paso establece los indicadores y el segundo paso genera c\u00f3digo JIT basado en esos indicadores. Con programas BPF que mezclan bpf2bpf y llamadas de cola, build_prologue() genera N insns en el primer paso y luego genera N + 1 insns en el segundo paso. Esto hace que epilogue_offset se desv\u00ede en uno y saltaremos a alg\u00fan insn inesperado y causaremos un bloqueo. Arregle esto insertando un insn nop.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-193\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1\",\"versionEndExcluding\":\"6.1.134\",\"matchCriteriaId\":\"10FAA32F-8D33-4A36-8482-01961DD84A84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.87\",\"matchCriteriaId\":\"EFF24260-49B1-4251-9477-C564CFDAD25B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.12.23\",\"matchCriteriaId\":\"26CAB76D-F00F-43CE-BEAD-7097F8FB1D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.13\",\"versionEndExcluding\":\"6.13.11\",\"matchCriteriaId\":\"E7E864B0-8C00-4679-BA55-659B4C9C3AD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.14\",\"versionEndExcluding\":\"6.14.2\",\"matchCriteriaId\":\"FADAE5D8-4808-442C-B218-77B2CE8780A0\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/205a2182c51ffebaef54d643e3745e720cded08b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/48b904de2408af5f936f0e03f48dfcddeab58aa0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7e2586991e36663c9bc48c828b83eab180ad30a9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b3ffad2f02db4aace6799fe0049508b8925eae45\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c74d95a5679741ef428974ab788f5b0758dc78ae\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.