In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check in _bpfgetstackid() Syzkaller reported a KASAN slab-out-of-bounds write in _bpfgetstackid() when copying stack trace data. The issue occurs when the perf trace contains more stack entries than the stack map bucket can hold, leading to an out-of-bounds write in the bucket's data array.