CVE-2025-68744
Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: Free special fields when update [lru_,]percpu_hash maps
As [lru_,]percpu_hash maps support BPF_KPTR_{REF,PERCPU}, missing calls to 'bpf_obj_free_fields()' in 'pcpu_copy_value()' could cause the memory referenced by BPF_KPTR_{REF,PERCPU} fields to be held until the map gets freed.
Fix this by calling 'bpf_obj_free_fields()' after 'copy_map_value[,_long]()' in 'pcpu_copy_value()'.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing call to 'bpf_obj_free_fields()' in the kernel's BPF percpu hash map update path causes BPF_KPTR_{REF,PERCPU} fields to be leaked until the map is freed.
Root
Cause
When updating [lru_,]percpu_hash maps that support BPF_KPTR_{REF,PERCPU} fields, the kernel's pcpu_copy_value() function calls copy_map_value[,_long]() but does not invoke bpf_obj_free_fields() to release the previously stored BPF pointer fields. This omission means that old values' the memory referenced by those special fields is not freed during the update, creating a memory leak that persists until the entire map is freed.
Exploitation
Prerequisites
An attacker must have the ability to trigger map updates on a percpu BPF map that contains kptr fields. This typically requires local access to execute BPF programs with CAP_BPF or equivalent privileges, as BPF operations are restricted. No network-based remote exploitation is described.
Impact
A local attacker who can repeatedly update such a BPF map can cause a gradual depletion of kernel memory by preventing the release of BPF kptr references. This memory leak could lead to denial-of-service conditions on the affected system, degrading performance or eventually causing the system to become unresponsive.
Mitigation
The fix, introduced in Linux kernel commit 4a03d69cece1 (and also available via commit 3bf1378747e2e5), adds the missing bpf_obj_free_fields() call after the copy operation in pcpu_copy_value(). Users should apply the latest stable kernel update containing this patch. No known workaround is documented [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/stable/c/3bf1378747e251571e0de15e7e0a6bf2919044e7nvd
- git.kernel.org/stable/c/4a03d69cece145e4fb527464be29c3806aa3221envd
- git.kernel.org/stable/c/6af6e49a76c9af7d42eb923703e7648cb2bf401anvd
- git.kernel.org/stable/c/96a5cb7072cabbac5c66ac9318242c3bdceebb68nvd
- git.kernel.org/stable/c/994d6303ed0b84cbc795bb5becf7ed6de40d3f3cnvd
News mentions
0No linked articles in our index yet.