In the Linux kernel, the following vulnerability has been resolved:
bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()
bpf_map_lookup_percpu_elem() helper is also available for sleepable bpf
program. When BPF JIT is disabled or under 32-bit host,
bpf_map_lookup_percpu_elem() will not be inlined. Using it in a
sleepable bpf program will trigger the warning in
bpf_map_lookup_percpu_elem(), because the bpf program only holds
rcu_read_lock_trace lock. Therefore, add the missed check.
Metrics
Affected Vendors & Products
References
History
Sat, 05 Jul 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 04 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem() bpf_map_lookup_percpu_elem() helper is also available for sleepable bpf program. When BPF JIT is disabled or under 32-bit host, bpf_map_lookup_percpu_elem() will not be inlined. Using it in a sleepable bpf program will trigger the warning in bpf_map_lookup_percpu_elem(), because the bpf program only holds rcu_read_lock_trace lock. Therefore, add the missed check. | |
Title | bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-07-04T13:37:23.347Z
Updated: 2025-07-07T08:46:06.568Z
Reserved: 2025-04-16T04:51:23.994Z
Link: CVE-2025-38202

No data.

Status : Awaiting Analysis
Published: 2025-07-04T14:15:28.117
Modified: 2025-07-08T16:18:53.607
Link: CVE-2025-38202
