
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Linux kernel related to BPF (Berkeley Packet Filter) program handling, identified as CVE-2025-38280. The issue was discovered on July 10, 2025, and affects the kernel's BPF subsystem when JIT compilation fails. The vulnerability involves incorrect handling of BPF programs when JIT compilation is enabled but fails, leading to potential system instability (NVD).
The vulnerability occurs when creating a BPF program where 'fp->jitrequested' depends on bpfjitenable. The issue is triggered when CONFIGBPFJITALWAYSON is not set and bpfjitenable is set to 1, causing the architecture to attempt JIT compilation of the program. When the JIT compilation fails due to FAULTINJECTION, the system incorrectly treats the program as valid. When the program runs, it calls __bpf_prog_ret0_warn and triggers a WARNONONCE(1) condition (NVD).
The vulnerability affects system stability and could potentially lead to system warnings and unexpected behavior in the kernel's BPF subsystem. The issue primarily impacts systems where BPF JIT compilation is enabled but fails during execution (NVD).
The vulnerability has been fixed in the Linux kernel. Multiple Linux distributions have released updates to address this issue, including Debian which has fixed the vulnerability in version 6.12.35-1 for the 'trixie' release and 6.12.38-1 for 'sid' (Debian Security Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."