๐Ÿ” CVE Alert

CVE-2025-38502

UNKNOWN 0.0

bpf: Fix oob access in cgroup local storage

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix oob access in cgroup local storage Lonial reported that an out-of-bounds access in cgroup local storage can be crafted via tail calls. Given two programs each utilizing a cgroup local storage with a different value size, and one program doing a tail call into the other. The verifier will validate each of the indivial programs just fine. However, in the runtime context the bpf_cg_run_ctx holds an bpf_prog_array_item which contains the BPF program as well as any cgroup local storage flavor the program uses. Helpers such as bpf_get_local_storage() pick this up from the runtime context: ctx = container_of(current->bpf_ctx, struct bpf_cg_run_ctx, run_ctx); storage = ctx->prog_item->cgroup_storage[stype]; if (stype == BPF_CGROUP_STORAGE_SHARED) ptr = &READ_ONCE(storage->buf)->data[0]; else ptr = this_cpu_ptr(storage->percpu_buf); For the second program which was called from the originally attached one, this means bpf_get_local_storage() will pick up the former program's map, not its own. With mismatching sizes, this can result in an unintended out-of-bounds access. To fix this issue, we need to extend bpf_map_owner with an array of storage_cookie[] to match on i) the exact maps from the original program if the second program was using bpf_get_local_storage(), or ii) allow the tail call combination if the second program was not using any of the cgroup local storage maps.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 16, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7d9c3427894fe70d1347b4820476bf37736d2ff0 < c1c74584b9b4043c52e41fec415226e582d266a3 7d9c3427894fe70d1347b4820476bf37736d2ff0 < 66da7cee78590259b400e51a70622ccd41da7bb2 7d9c3427894fe70d1347b4820476bf37736d2ff0 < 7acfa07c585e3d7a64654d38f0a5c762877d0b9b 7d9c3427894fe70d1347b4820476bf37736d2ff0 < 41688d1fc5d163a6c2c0e95c0419e2cb31a44648 7d9c3427894fe70d1347b4820476bf37736d2ff0 < 19341d5c59e8c7e8528e40f8663e99d67810473c 7d9c3427894fe70d1347b4820476bf37736d2ff0 < abad3d0bad72a52137e0c350c59542d75ae4f513
Linux / Linux
5.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c1c74584b9b4043c52e41fec415226e582d266a3 git.kernel.org: https://git.kernel.org/stable/c/66da7cee78590259b400e51a70622ccd41da7bb2 git.kernel.org: https://git.kernel.org/stable/c/7acfa07c585e3d7a64654d38f0a5c762877d0b9b git.kernel.org: https://git.kernel.org/stable/c/41688d1fc5d163a6c2c0e95c0419e2cb31a44648 git.kernel.org: https://git.kernel.org/stable/c/19341d5c59e8c7e8528e40f8663e99d67810473c git.kernel.org: https://git.kernel.org/stable/c/abad3d0bad72a52137e0c350c59542d75ae4f513 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html