In the Linux kernel, the following vulnerability has been resolved:
bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()
bpf_map_lookup_percpu_elem() helper is also available for sleepable bpf
program. When BPF JIT is disabled or under 32-bit host,
bpf_map_lookup_percpu_elem() will not be inlined. Using it in a
sleepable bpf program will trigger the warning in
bpf_map_lookup_percpu_elem(), because the bpf program only holds
rcu_read_lock_trace lock. Therefore, add the missed check.
Metrics
Affected Vendors & Products
References
History
Sat, 05 Jul 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 04 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem() bpf_map_lookup_percpu_elem() helper is also available for sleepable bpf program. When BPF JIT is disabled or under 32-bit host, bpf_map_lookup_percpu_elem() will not be inlined. Using it in a sleepable bpf program will trigger the warning in bpf_map_lookup_percpu_elem(), because the bpf program only holds rcu_read_lock_trace lock. Therefore, add the missed check. | |
| Title | bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem() | |
| References |
|
|
Status: PUBLISHED
Assigner: Linux
Published: 2025-07-04T13:37:23.347Z
Updated: 2025-07-28T04:14:58.243Z
Reserved: 2025-04-16T04:51:23.994Z
Link: CVE-2025-38202
No data.
Status : Awaiting Analysis
Published: 2025-07-04T14:15:28.117
Modified: 2025-07-08T16:18:53.607
Link: CVE-2025-38202