VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2025-68744

CVE-2025-68744

Description

In the Linux kernel, the following vulnerability has been resolved:

bpf: Free special fields when update [lru_,]percpu_hash maps

As [lru_,]percpu_hash maps support BPF_KPTR_{REF,PERCPU}, missing calls to 'bpf_obj_free_fields()' in 'pcpu_copy_value()' could cause the memory referenced by BPF_KPTR_{REF,PERCPU} fields to be held until the map gets freed.

Fix this by calling 'bpf_obj_free_fields()' after 'copy_map_value[,_long]()' in 'pcpu_copy_value()'.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing call to 'bpf_obj_free_fields()' in the kernel's BPF percpu hash map update path causes BPF_KPTR_{REF,PERCPU} fields to be leaked until the map is freed.

Root

Cause

When updating [lru_,]percpu_hash maps that support BPF_KPTR_{REF,PERCPU} fields, the kernel's pcpu_copy_value() function calls copy_map_value[,_long]() but does not invoke bpf_obj_free_fields() to release the previously stored BPF pointer fields. This omission means that old values' the memory referenced by those special fields is not freed during the update, creating a memory leak that persists until the entire map is freed.

Exploitation

Prerequisites

An attacker must have the ability to trigger map updates on a percpu BPF map that contains kptr fields. This typically requires local access to execute BPF programs with CAP_BPF or equivalent privileges, as BPF operations are restricted. No network-based remote exploitation is described.

Impact

A local attacker who can repeatedly update such a BPF map can cause a gradual depletion of kernel memory by preventing the release of BPF kptr references. This memory leak could lead to denial-of-service conditions on the affected system, degrading performance or eventually causing the system to become unresponsive.

Mitigation

The fix, introduced in Linux kernel commit 4a03d69cece1 (and also available via commit 3bf1378747e2e5), adds the missing bpf_obj_free_fields() call after the copy operation in pcpu_copy_value(). Users should apply the latest stable kernel update containing this patch. No known workaround is documented [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.