In the Linux kernel, the following vulnerability has been resolved:
bpf: Check rcureadlocktraceheld() in bpfmaplookuppercpuelem()
bpfmaplookuppercpuelem() helper is also available for sleepable bpf program. When BPF JIT is disabled or under 32-bit host, bpfmaplookuppercpuelem() will not be inlined. Using it in a sleepable bpf program will trigger the warning in bpfmaplookuppercpuelem(), because the bpf program only holds rcureadlock_trace lock. Therefore, add the missed check.
[
{
"signature_type": "Line",
"id": "CVE-2025-38202-2d7d2968",
"target": {
"file": "kernel/bpf/helpers.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7bf4461f1c97207fda757014690d55a447ce859f",
"digest": {
"threshold": 0.9,
"line_hashes": [
"92785854260136020366892101796664910442",
"191928798520740965001060959356787260525",
"329616102725535557235748287132660148731",
"262220033016877388896744476729720246669"
]
}
},
{
"signature_type": "Function",
"id": "CVE-2025-38202-3eeaa9a4",
"target": {
"function": "BPF_CALL_3",
"file": "kernel/bpf/helpers.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7bf4461f1c97207fda757014690d55a447ce859f",
"digest": {
"function_hash": "212006179695962923694443322137360235542",
"length": 215.0
}
},
{
"signature_type": "Line",
"id": "CVE-2025-38202-908f9e5c",
"target": {
"file": "kernel/bpf/helpers.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2d834477bbc1e8b8a59ff8b0c081529d6bed7b22",
"digest": {
"threshold": 0.9,
"line_hashes": [
"92785854260136020366892101796664910442",
"191928798520740965001060959356787260525",
"329616102725535557235748287132660148731",
"262220033016877388896744476729720246669"
]
}
},
{
"signature_type": "Function",
"id": "CVE-2025-38202-b3788035",
"target": {
"function": "BPF_CALL_3",
"file": "kernel/bpf/helpers.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b522d4d334f206284b1a44b0b0b2f99fd443b39b",
"digest": {
"function_hash": "212006179695962923694443322137360235542",
"length": 215.0
}
},
{
"signature_type": "Line",
"id": "CVE-2025-38202-cdafb99d",
"target": {
"file": "kernel/bpf/helpers.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b522d4d334f206284b1a44b0b0b2f99fd443b39b",
"digest": {
"threshold": 0.9,
"line_hashes": [
"92785854260136020366892101796664910442",
"191928798520740965001060959356787260525",
"329616102725535557235748287132660148731",
"262220033016877388896744476729720246669"
]
}
},
{
"signature_type": "Line",
"id": "CVE-2025-38202-dcc616ea",
"target": {
"file": "kernel/bpf/helpers.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2f8c69a72e8ad87b36b8052f789da3cc2b2e186c",
"digest": {
"threshold": 0.9,
"line_hashes": [
"92785854260136020366892101796664910442",
"191928798520740965001060959356787260525",
"329616102725535557235748287132660148731",
"262220033016877388896744476729720246669"
]
}
},
{
"signature_type": "Function",
"id": "CVE-2025-38202-e0c5bb7f",
"target": {
"function": "BPF_CALL_3",
"file": "kernel/bpf/helpers.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d4965578267e2e81f67c86e2608481e77e9c8569",
"digest": {
"function_hash": "212006179695962923694443322137360235542",
"length": 215.0
}
},
{
"signature_type": "Line",
"id": "CVE-2025-38202-eaa4bd41",
"target": {
"file": "kernel/bpf/helpers.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d4965578267e2e81f67c86e2608481e77e9c8569",
"digest": {
"threshold": 0.9,
"line_hashes": [
"92785854260136020366892101796664910442",
"191928798520740965001060959356787260525",
"329616102725535557235748287132660148731",
"262220033016877388896744476729720246669"
]
}
},
{
"signature_type": "Function",
"id": "CVE-2025-38202-f45316b7",
"target": {
"function": "BPF_CALL_3",
"file": "kernel/bpf/helpers.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2d834477bbc1e8b8a59ff8b0c081529d6bed7b22",
"digest": {
"function_hash": "212006179695962923694443322137360235542",
"length": 215.0
}
},
{
"signature_type": "Function",
"id": "CVE-2025-38202-f50099af",
"target": {
"function": "BPF_CALL_3",
"file": "kernel/bpf/helpers.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2f8c69a72e8ad87b36b8052f789da3cc2b2e186c",
"digest": {
"function_hash": "212006179695962923694443322137360235542",
"length": 215.0
}
}
]