Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-38502— bpf: Fix oob access in cgroup local storage

EPSS 0.03% · P9

Affected Version Matrix 14

VendorProductVersion RangeStatus
LinuxLinux7d9c3427894fe70d1347b4820476bf37736d2ff0< c1c74584b9b4043c52e41fec415226e582d266a3affected
7d9c3427894fe70d1347b4820476bf37736d2ff0< 66da7cee78590259b400e51a70622ccd41da7bb2affected
7d9c3427894fe70d1347b4820476bf37736d2ff0< 7acfa07c585e3d7a64654d38f0a5c762877d0b9baffected
7d9c3427894fe70d1347b4820476bf37736d2ff0< 41688d1fc5d163a6c2c0e95c0419e2cb31a44648affected
7d9c3427894fe70d1347b4820476bf37736d2ff0< 19341d5c59e8c7e8528e40f8663e99d67810473caffected
7d9c3427894fe70d1347b4820476bf37736d2ff0< abad3d0bad72a52137e0c350c59542d75ae4f513affected
5.9affected
< 5.9unaffected
… +6 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-38502

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
bpf: Fix oob access in cgroup local storage
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix oob access in cgroup local storage Lonial reported that an out-of-bounds access in cgroup local storage can be crafted via tail calls. Given two programs each utilizing a cgroup local storage with a different value size, and one program doing a tail call into the other. The verifier will validate each of the indivial programs just fine. However, in the runtime context the bpf_cg_run_ctx holds an bpf_prog_array_item which contains the BPF program as well as any cgroup local storage flavor the program uses. Helpers such as bpf_get_local_storage() pick this up from the runtime context: ctx = container_of(current->bpf_ctx, struct bpf_cg_run_ctx, run_ctx); storage = ctx->prog_item->cgroup_storage[stype]; if (stype == BPF_CGROUP_STORAGE_SHARED) ptr = &READ_ONCE(storage->buf)->data[0]; else ptr = this_cpu_ptr(storage->percpu_buf); For the second program which was called from the originally attached one, this means bpf_get_local_storage() will pick up the former program's map, not its own. With mismatching sizes, this can result in an unintended out-of-bounds access. To fix this issue, we need to extend bpf_map_owner with an array of storage_cookie[] to match on i) the exact maps from the original program if the second program was using bpf_get_local_storage(), or ii) allow the tail call combination if the second program was not using any of the cgroup local storage maps.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于cgroup本地存储存在越界访问,可能导致执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 7d9c3427894fe70d1347b4820476bf37736d2ff0 ~ c1c74584b9b4043c52e41fec415226e582d266a3 -
LinuxLinux 5.9 -

II. Public POCs for CVE-2025-38502

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-38502

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-08-16 · 59 CVEs total

CVE-2025-38520drm/amdkfd: Don't call mmput from MMU notifier callback
CVE-2025-38509wifi: mac80211: reject VHT opmode for unsupported channel widths
CVE-2025-38505wifi: mwifiex: discard erroneous disassoc frames on STA interface
CVE-2025-38506KVM: Allow CPU to reschedule while setting per-page memory attributes
CVE-2025-38507HID: nintendo: avoid bluetooth suspend/resume stalls
CVE-2025-38504io_uring/zcrx: fix pp destruction warnings
CVE-2025-38516pinctrl: qcom: msm: mark certain pins as invalid for interrupts
CVE-2025-38517lib/alloc_tag: do not acquire non-existent lock in alloc_tag_top_users()
CVE-2025-38518x86/CPU/AMD: Disable INVLPGB on Zen2
CVE-2025-38519mm/damon: fix divide by zero in damon_get_intervals_score()
CVE-2025-38515drm/sched: Increment job count before swapping tail spsc queue
CVE-2025-38521drm/imagination: Fix kernel crash when hard resetting the GPU
CVE-2025-38522sched/ext: Prevent update_locked_rq() calls with NULL rq
CVE-2025-38523cifs: Fix the smbd_response slab to allow usercopy
CVE-2025-38524rxrpc: Fix recv-recv race of completed call
CVE-2025-38525rxrpc: Fix irq-disabled in local_bh_enable()
CVE-2025-38526ice: add NULL check in eswitch lag check
CVE-2025-38527smb: client: fix use-after-free in cifs_oplock_break
CVE-2025-38528bpf: Reject %p% format string in bprintf-like helpers
CVE-2025-38529comedi: aio_iiro_16: Fix bit shift out of bounds

Showing top 20 of 59 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-38502

No comments yet


Leave a comment