CVE-2025-38280

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/07/2025
Last modified:
18/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Avoid __bpf_prog_ret0_warn when jit fails<br /> <br /> syzkaller reported an issue:<br /> <br /> WARNING: CPU: 3 PID: 217 at kernel/bpf/core.c:2357 __bpf_prog_ret0_warn+0xa/0x20 kernel/bpf/core.c:2357<br /> Modules linked in:<br /> CPU: 3 UID: 0 PID: 217 Comm: kworker/u32:6 Not tainted 6.15.0-rc4-syzkaller-00040-g8bac8898fe39<br /> RIP: 0010:__bpf_prog_ret0_warn+0xa/0x20 kernel/bpf/core.c:2357<br /> Call Trace:<br /> <br /> bpf_dispatcher_nop_func include/linux/bpf.h:1316 [inline]<br /> __bpf_prog_run include/linux/filter.h:718 [inline]<br /> bpf_prog_run include/linux/filter.h:725 [inline]<br /> cls_bpf_classify+0x74a/0x1110 net/sched/cls_bpf.c:105<br /> ...<br /> <br /> When creating bpf program, &amp;#39;fp-&gt;jit_requested&amp;#39; depends on bpf_jit_enable.<br /> This issue is triggered because of CONFIG_BPF_JIT_ALWAYS_ON is not set<br /> and bpf_jit_enable is set to 1, causing the arch to attempt JIT the prog,<br /> but jit failed due to FAULT_INJECTION. As a result, incorrectly<br /> treats the program as valid, when the program runs it calls<br /> `__bpf_prog_ret0_warn` and triggers the WARN_ON_ONCE(1).

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.9.190 (including) 4.10 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.14.140 (including) 4.15 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.16 (including) 5.15.186 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.142 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.94 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.34 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.3 (excluding)
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*