-
CVE-2025-68744
- EPSS 0.03%
- Veröffentlicht 24.12.2025 12:09:40
- Zuletzt bearbeitet 11.01.2026 17:15:57
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
bpf: Free special fields when update [lru_,]percpu_hash maps
As [lru_,]percpu_hash maps support BPF_KPTR_{REF,PERCPU}, missing
calls to 'bpf_obj_free_fields()' in 'pcpu_copy_value()' could cause the
memory referenced by BPF_KPTR_{REF,PERCPU} fields to be held until the
map gets freed.
Fix this by calling 'bpf_obj_free_fields()' after
'copy_map_value[,_long]()' in 'pcpu_copy_value()'.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
994d6303ed0b84cbc795bb5becf7ed6de40d3f3c
Version
65334e64a493c6a0976de7ad56bf8b7a9ff04b4a
Status
affected
Version <
3bf1378747e251571e0de15e7e0a6bf2919044e7
Version
65334e64a493c6a0976de7ad56bf8b7a9ff04b4a
Status
affected
Version <
96a5cb7072cabbac5c66ac9318242c3bdceebb68
Version
65334e64a493c6a0976de7ad56bf8b7a9ff04b4a
Status
affected
Version <
4a03d69cece145e4fb527464be29c3806aa3221e
Version
65334e64a493c6a0976de7ad56bf8b7a9ff04b4a
Status
affected
Version <
6af6e49a76c9af7d42eb923703e7648cb2bf401a
Version
65334e64a493c6a0976de7ad56bf8b7a9ff04b4a
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.4
Status
affected
Version <
6.4
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.120
Status
unaffected
Version <=
6.12.*
Version
6.12.63
Status
unaffected
Version <=
6.17.*
Version
6.17.13
Status
unaffected
Version <=
6.18.*
Version
6.18.2
Status
unaffected
Version <=
*
Version
6.19-rc1
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.065 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|