In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix stackmap overflow check in _bpfget_stackid()
Syzkaller reported a KASAN slab-out-of-bounds write in _bpfget_stackid() when copying stack trace data. The issue occurs when the perf trace contains more stack entries than the stack map bucket can hold, leading to an out-of-bounds write in the bucket's data array.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68378.json"
}