In the Linux kernel, the following vulnerability has been resolved:
bpf: Check rcureadlocktraceheld() in bpfmaplookuppercpuelem()
bpfmaplookuppercpuelem() helper is also available for sleepable bpf program. When BPF JIT is disabled or under 32-bit host, bpfmaplookuppercpuelem() will not be inlined. Using it in a sleepable bpf program will trigger the warning in bpfmaplookuppercpuelem(), because the bpf program only holds rcureadlock_trace lock. Therefore, add the missed check.
[
{
"deprecated": false,
"target": {
"file": "kernel/bpf/helpers.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"92785854260136020366892101796664910442",
"191928798520740965001060959356787260525",
"329616102725535557235748287132660148731",
"262220033016877388896744476729720246669"
]
},
"id": "CVE-2025-38202-2d7d2968",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7bf4461f1c97207fda757014690d55a447ce859f",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "kernel/bpf/helpers.c",
"function": "BPF_CALL_3"
},
"digest": {
"length": 215.0,
"function_hash": "212006179695962923694443322137360235542"
},
"id": "CVE-2025-38202-3eeaa9a4",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7bf4461f1c97207fda757014690d55a447ce859f",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "kernel/bpf/helpers.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"92785854260136020366892101796664910442",
"191928798520740965001060959356787260525",
"329616102725535557235748287132660148731",
"262220033016877388896744476729720246669"
]
},
"id": "CVE-2025-38202-908f9e5c",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2d834477bbc1e8b8a59ff8b0c081529d6bed7b22",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "kernel/bpf/helpers.c",
"function": "BPF_CALL_3"
},
"digest": {
"length": 215.0,
"function_hash": "212006179695962923694443322137360235542"
},
"id": "CVE-2025-38202-e0c5bb7f",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d4965578267e2e81f67c86e2608481e77e9c8569",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "kernel/bpf/helpers.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"92785854260136020366892101796664910442",
"191928798520740965001060959356787260525",
"329616102725535557235748287132660148731",
"262220033016877388896744476729720246669"
]
},
"id": "CVE-2025-38202-eaa4bd41",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d4965578267e2e81f67c86e2608481e77e9c8569",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "kernel/bpf/helpers.c",
"function": "BPF_CALL_3"
},
"digest": {
"length": 215.0,
"function_hash": "212006179695962923694443322137360235542"
},
"id": "CVE-2025-38202-f45316b7",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2d834477bbc1e8b8a59ff8b0c081529d6bed7b22",
"signature_version": "v1"
}
]