Wind River Support Network

HomeDefectsLIN1023-13838
Acknowledged

LIN1023-13838 : Security Advisory - linux - CVE-2025-38202

Created: Jul 7, 2025    Updated: Jul 8, 2025
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()[EOL][EOL]bpf_map_lookup_percpu_elem() helper is also available for sleepable bpf[EOL]program. When BPF JIT is disabled or under 32-bit host,[EOL]bpf_map_lookup_percpu_elem() will not be inlined. Using it in a[EOL]sleepable bpf program will trigger the warning in[EOL]bpf_map_lookup_percpu_elem(), because the bpf program only holds[EOL]rcu_read_lock_trace lock. Therefore, add the missed check.

CREATE(Triage):(User=admin) [CVE-2025-38202 (https://nvd.nist.gov/vuln/detail/CVE-2025-38202)
Live chat
Online