Логотип exploitDog
bind:CVE-2025-68378
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-68378

Количество 5

Количество 5

ubuntu логотип

CVE-2025-68378

около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check in __bpf_get_stackid() Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid() when copying stack trace data. The issue occurs when the perf trace contains more stack entries than the stack map bucket can hold, leading to an out-of-bounds write in the bucket's data array.

EPSS: Низкий
nvd логотип

CVE-2025-68378

около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check in __bpf_get_stackid() Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid() when copying stack trace data. The issue occurs when the perf trace contains more stack entries than the stack map bucket can hold, leading to an out-of-bounds write in the bucket's data array.

EPSS: Низкий
msrc логотип

CVE-2025-68378

около 1 месяца назад

bpf: Fix stackmap overflow check in __bpf_get_stackid()

EPSS: Низкий
debian логотип

CVE-2025-68378

около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: b ...

EPSS: Низкий
github логотип

GHSA-v87c-3vwm-rvcr

около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check in __bpf_get_stackid() Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid() when copying stack trace data. The issue occurs when the perf trace contains more stack entries than the stack map bucket can hold, leading to an out-of-bounds write in the bucket's data array.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-68378

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check in __bpf_get_stackid() Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid() when copying stack trace data. The issue occurs when the perf trace contains more stack entries than the stack map bucket can hold, leading to an out-of-bounds write in the bucket's data array.

0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2025-68378

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check in __bpf_get_stackid() Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid() when copying stack trace data. The issue occurs when the perf trace contains more stack entries than the stack map bucket can hold, leading to an out-of-bounds write in the bucket's data array.

0%
Низкий
около 1 месяца назад
msrc логотип
CVE-2025-68378

bpf: Fix stackmap overflow check in __bpf_get_stackid()

0%
Низкий
около 1 месяца назад
debian логотип
CVE-2025-68378

In the Linux kernel, the following vulnerability has been resolved: b ...

0%
Низкий
около 1 месяца назад
github логотип
GHSA-v87c-3vwm-rvcr

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check in __bpf_get_stackid() Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid() when copying stack trace data. The issue occurs when the perf trace contains more stack entries than the stack map bucket can hold, leading to an out-of-bounds write in the bucket's data array.

0%
Низкий
около 1 месяца назад

Уязвимостей на страницу