Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-38202
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-04 Jul, 2025 | 13:37
Updated At-03 Nov, 2025 | 17:35
Rejected At-
▼CVE Numbering Authority (CNA)
bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()

In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem() bpf_map_lookup_percpu_elem() helper is also available for sleepable bpf program. When BPF JIT is disabled or under 32-bit host, bpf_map_lookup_percpu_elem() will not be inlined. Using it in a sleepable bpf program will trigger the warning in bpf_map_lookup_percpu_elem(), because the bpf program only holds rcu_read_lock_trace lock. Therefore, add the missed check.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/bpf/helpers.c
Default Status
unaffected
Versions
Affected
  • From 07343110b293456d30393e89b86c4dee1ac051c8 before 2f8c69a72e8ad87b36b8052f789da3cc2b2e186c (git)
  • From 07343110b293456d30393e89b86c4dee1ac051c8 before 7bf4461f1c97207fda757014690d55a447ce859f (git)
  • From 07343110b293456d30393e89b86c4dee1ac051c8 before 2d834477bbc1e8b8a59ff8b0c081529d6bed7b22 (git)
  • From 07343110b293456d30393e89b86c4dee1ac051c8 before b522d4d334f206284b1a44b0b0b2f99fd443b39b (git)
  • From 07343110b293456d30393e89b86c4dee1ac051c8 before d4965578267e2e81f67c86e2608481e77e9c8569 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/bpf/helpers.c
Default Status
affected
Versions
Affected
  • 5.19
Unaffected
  • From 0 before 5.19 (semver)
  • From 6.1.142 through 6.1.* (semver)
  • From 6.6.95 through 6.6.* (semver)
  • From 6.12.35 through 6.12.* (semver)
  • From 6.15.4 through 6.15.* (semver)
  • From 6.16 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/2f8c69a72e8ad87b36b8052f789da3cc2b2e186c
N/A
https://git.kernel.org/stable/c/7bf4461f1c97207fda757014690d55a447ce859f
N/A
https://git.kernel.org/stable/c/2d834477bbc1e8b8a59ff8b0c081529d6bed7b22
N/A
https://git.kernel.org/stable/c/b522d4d334f206284b1a44b0b0b2f99fd443b39b
N/A
https://git.kernel.org/stable/c/d4965578267e2e81f67c86e2608481e77e9c8569
N/A
Hyperlink: https://git.kernel.org/stable/c/2f8c69a72e8ad87b36b8052f789da3cc2b2e186c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7bf4461f1c97207fda757014690d55a447ce859f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2d834477bbc1e8b8a59ff8b0c081529d6bed7b22
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b522d4d334f206284b1a44b0b0b2f99fd443b39b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d4965578267e2e81f67c86e2608481e77e9c8569
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
Resource: N/A
Details not found