Acknowledged
Created: Jul 10, 2025
Updated: Jul 14, 2025
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]bpf: Avoid __bpf_prog_ret0_warn when jit fails[EOL][EOL]syzkaller reported an issue:[EOL][EOL]WARNING: CPU: 3 PID: 217 at kernel/bpf/core.c:2357 __bpf_prog_ret0_warn+0xa/0x20 kernel/bpf/core.c:2357[EOL]Modules linked in:[EOL]CPU: 3 UID: 0 PID: 217 Comm: kworker/u32:6 Not tainted 6.15.0-rc4-syzkaller-00040-g8bac8898fe39[EOL]RIP: 0010:__bpf_prog_ret0_warn+0xa/0x20 kernel/bpf/core.c:2357[EOL]Call Trace:[EOL] <TASK>[EOL] bpf_dispatcher_nop_func include/linux/bpf.h:1316 [inline][EOL] __bpf_prog_run include/linux/filter.h:718 [inline][EOL] bpf_prog_run include/linux/filter.h:725 [inline][EOL] cls_bpf_classify+0x74a/0x1110 net/sched/cls_bpf.c:105[EOL] ...[EOL][EOL]When creating bpf program, 'fp->jit_requested' depends on bpf_jit_enable.[EOL]This issue is triggered because of CONFIG_BPF_JIT_ALWAYS_ON is not set[EOL]and bpf_jit_enable is set to 1, causing the arch to attempt JIT the prog,[EOL]but jit failed due to FAULT_INJECTION. As a result, incorrectly[EOL]treats the program as valid, when the program runs it calls[EOL]`__bpf_prog_ret0_warn` and triggers the WARN_ON_ONCE(1).
CREATE(Triage):(User=admin) [CVE-2025-38280 (https://nvd.nist.gov/vuln/detail/CVE-2025-38280)