CVE-2025-68216

Source
https://cve.org/CVERecord?id=CVE-2025-68216
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68216.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68216
Downstream
Published
2025-12-16T13:57:11.303Z
Modified
2026-03-10T21:46:43.255210Z
Summary
LoongArch: BPF: Disable trampoline for kernel module function trace
Details

In the Linux kernel, the following vulnerability has been resolved:

LoongArch: BPF: Disable trampoline for kernel module function trace

The current LoongArch BPF trampoline implementation is incompatible with tracing functions in kernel modules. This causes several severe and user-visible problems:

  • The bpf_selftests/module_attach test fails consistently.
  • Kernel lockup when a BPF program is attached to a module function [1].
  • Critical kernel modules like WireGuard experience traffic disruption when their functions are traced with fentry [2].

Given the severity and the potential for other unknown side-effects, it is safest to disable the feature entirely for now. This patch prevents the BPF subsystem from allowing trampoline attachments to kernel module functions on LoongArch.

This is a temporary mitigation until the core issues in the trampoline code for kernel module handling can be identified and fixed.

[root@fedora bpf]# ./testprogs -a moduleattach -v bpftestmod.ko is already unloaded. Loading bpftestmod.ko... Successfully loaded bpftestmod.ko. testmoduleattach:PASS:skelopen 0 nsec testmoduleattach:PASS:setattachtarget 0 nsec testmoduleattach:PASS:setattachtargetexplicit 0 nsec testmoduleattach:PASS:skelload 0 nsec libbpf: prog 'handlefentry': failed to attach: -ENOTSUPP libbpf: prog 'handlefentry': failed to auto-attach: -ENOTSUPP testmoduleattach:FAIL:skelattach skeleton attach failed: -524 Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED Successfully unloaded bpftestmod.ko.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68216.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f9b6b41f0cf31791541cea9644ddbedb46465801
Fixed
44eb3849378be5f72b8be03edbacbdcd6f5eade4
Fixed
677e6123e3d24adaa252697dc89740f2ac07664e

Affected versions

v6.*
v6.17
v6.17-rc1
v6.17-rc2
v6.17-rc3
v6.17-rc4
v6.17-rc5
v6.17-rc6
v6.17-rc7
v6.17.1
v6.17.2
v6.17.3
v6.17.4
v6.17.5
v6.17.6
v6.17.7
v6.17.8
v6.17.9
v6.18-rc1
v6.18-rc2
v6.18-rc3
v6.18-rc4
v6.18-rc5
v6.18-rc6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68216.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.17.0
Fixed
6.17.10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68216.json"