
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Linux kernel related to BPF (Berkeley Packet Filter) handling of conditional jumps. The vulnerability (CVE-2025-38607) was disclosed on August 19, 2025, affecting the BPF verifier's handling of JSET operations in CFG computation (NVD).
The vulnerability exists in the Linux kernel's BPF verifier where BPFJSET, a conditional jump operation, is not properly handled in the verifier.c:canjump() function. This leads to incorrect computation of live registers and SCC (Strongly Connected Components). For example, in a sequence where 'if r1 & 0x7 goto +1' is used, the insn_successors(3) function only returns (4), missing a jump to (5), resulting in r2 not being marked as alive at (3) (NVD).
The vulnerability affects the BPF verifier's ability to correctly track register states and compute control flow, which could potentially lead to incorrect program verification. This impacts the kernel's ability to properly validate BPF programs before execution (Debian Security).
The vulnerability has been fixed in various Linux distributions. Ubuntu has released patches for multiple versions including 6.8.0-40.40 for noble, 5.15.0-121.131 for jammy, and 5.4.0-192.212 for focal. Debian has also released fixes for various versions including bullseye (5.10.237-1), bookworm (6.1.147-1), and trixie (6.12.41-1) (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."