CVE-2025-38202

Source
https://cve.org/CVERecord?id=CVE-2025-38202
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38202.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38202
Downstream
Related
Published
2025-07-04T13:37:23.347Z
Modified
2026-03-20T12:42:44.232075Z
Summary
bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Check rcureadlocktraceheld() in bpfmaplookuppercpuelem()

bpfmaplookuppercpuelem() helper is also available for sleepable bpf program. When BPF JIT is disabled or under 32-bit host, bpfmaplookuppercpuelem() will not be inlined. Using it in a sleepable bpf program will trigger the warning in bpfmaplookuppercpuelem(), because the bpf program only holds rcureadlock_trace lock. Therefore, add the missed check.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38202.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
07343110b293456d30393e89b86c4dee1ac051c8
Fixed
2f8c69a72e8ad87b36b8052f789da3cc2b2e186c
Fixed
7bf4461f1c97207fda757014690d55a447ce859f
Fixed
2d834477bbc1e8b8a59ff8b0c081529d6bed7b22
Fixed
b522d4d334f206284b1a44b0b0b2f99fd443b39b
Fixed
d4965578267e2e81f67c86e2608481e77e9c8569

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38202.json"