VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2025-68378

CVE-2025-68378

Description

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix stackmap overflow check in __bpf_get_stackid()

Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid() when copying stack trace data. The issue occurs when the perf trace contains more stack entries than the stack map bucket can hold, leading to an out-of-bounds write in the bucket's data array.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A slab-out-of-bounds write in Linux kernel's bpf __bpf_get_stackid() occurs when stack trace entries exceed the stack map bucket size.

Vulnerability

A slab-out-of-bounds write vulnerability exists in the Linux kernel's BPF subsystem within the __bpf_get_stackid() function. The overflow check fails to properly handle stack traces containing more entries than the allocated stack map bucket can accommodate, leading to an out-of-bounds write in the bucket's data array, as reported by syzkaller via KASAN.

Exploitation

Triggering the vulnerability requires a local user with the ability to load and run BPF programs, specifically those that capture stack traces using bpf_get_stackid(). No additional privileges are needed; any process with CAP_BPF or access to BPF operations can potentially exploit this flaw.

Impact

An attacker successfully exploiting this vulnerability can write beyond the bounds of a kernel slab allocation, potentially corrupting adjacent kernel memory. This can lead to system instability, denial of service, or escalation of privileges, depending on the memory layout.

Mitigation

The issue has been patched in the Linux kernel stable tree via commits [1] and [2]. Users are advised to update their kernels to the latest patched versions to remediate the vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.