
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Linux kernel related to the bpfmaplookuppercpuelem() helper function (CVE-2025-38202). The issue was disclosed on July 4, 2025, affecting the Berkeley Packet Filter (BPF) subsystem (NVD).
The vulnerability occurs when BPF JIT is disabled or under 32-bit host environments, where bpfmaplookuppercpuelem() will not be inlined. When used in a sleepable BPF program, it triggers a warning because the BPF program only holds rcureadlock_trace lock instead of the required lock check (NVD, Debian).
The vulnerability affects multiple Linux distributions and their derivatives, including Ubuntu and Debian. Various kernel versions are impacted across different releases, with some distributions already having fixes in place while others remain vulnerable (Ubuntu).
The issue has been resolved in some Linux distributions. Debian has fixed the vulnerability in bullseye (5.10.237-1) and trixie (6.12.35-1) releases, while it remains vulnerable in bookworm. Ubuntu has marked this as a medium priority issue and is working on updates for affected versions (Debian).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."