CVE-2025-38502

Source
https://cve.org/CVERecord?id=CVE-2025-38502
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38502.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38502
Downstream
Published
2025-08-16T09:34:25.135Z
Modified
2026-03-20T12:42:53.377647Z
Summary
bpf: Fix oob access in cgroup local storage
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix oob access in cgroup local storage

Lonial reported that an out-of-bounds access in cgroup local storage can be crafted via tail calls. Given two programs each utilizing a cgroup local storage with a different value size, and one program doing a tail call into the other. The verifier will validate each of the indivial programs just fine. However, in the runtime context the bpfcgrunctx holds an bpfprogarrayitem which contains the BPF program as well as any cgroup local storage flavor the program uses. Helpers such as bpfgetlocal_storage() pick this up from the runtime context:

ctx = containerof(current->bpfctx, struct bpfcgrunctx, runctx); storage = ctx->progitem->cgroupstorage[stype];

if (stype == BPFCGROUPSTORAGESHARED) ptr = &READONCE(storage->buf)->data[0]; else ptr = thiscpuptr(storage->percpu_buf);

For the second program which was called from the originally attached one, this means bpfgetlocal_storage() will pick up the former program's map, not its own. With mismatching sizes, this can result in an unintended out-of-bounds access.

To fix this issue, we need to extend bpfmapowner with an array of storagecookie[] to match on i) the exact maps from the original program if the second program was using bpfgetlocalstorage(), or ii) allow the tail call combination if the second program was not using any of the cgroup local storage maps.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38502.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7d9c3427894fe70d1347b4820476bf37736d2ff0
Fixed
c1c74584b9b4043c52e41fec415226e582d266a3
Fixed
66da7cee78590259b400e51a70622ccd41da7bb2
Fixed
7acfa07c585e3d7a64654d38f0a5c762877d0b9b
Fixed
41688d1fc5d163a6c2c0e95c0419e2cb31a44648
Fixed
19341d5c59e8c7e8528e40f8663e99d67810473c
Fixed
abad3d0bad72a52137e0c350c59542d75ae4f513

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38502.json"