CVE-2025-68378

high

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check in __bpf_get_stackid() Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid() when copying stack trace data. The issue occurs when the perf trace contains more stack entries than the stack map bucket can hold, leading to an out-of-bounds write in the bucket's data array.

References

https://git.kernel.org/stable/c/d1f424a77b6bd27b361737ed73df49a0158f1590

https://git.kernel.org/stable/c/4669a8db976c8cbd5427fe9945f12c5fa5168ff3

https://git.kernel.org/stable/c/2a008f6de163279deffd488c1deab081bce5667c

https://git.kernel.org/stable/c/23f852daa4bab4d579110e034e4d513f7d490846

Details

Source: Mitre, NVD

Published: 2025-12-24

Updated: 2025-12-24

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00018