CVE-2025-38202

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38202
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38202.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38202
Downstream
Related
Published
2025-07-04T14:15:28Z
Modified
2025-08-12T21:01:17Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Check rcureadlocktraceheld() in bpfmaplookuppercpuelem()

bpfmaplookuppercpuelem() helper is also available for sleepable bpf program. When BPF JIT is disabled or under 32-bit host, bpfmaplookuppercpuelem() will not be inlined. Using it in a sleepable bpf program will trigger the warning in bpfmaplookuppercpuelem(), because the bpf program only holds rcureadlock_trace lock. Therefore, add the missed check.

References

Affected packages