Home

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix exclusive map memory leak When excl_prog_hash is 0 and excl_prog_hash_size is non-zero, the map also needs to be freed. Otherwise, the map memory will not be reclaimed, just like the memory leak problem reported by syzbot [1]. syzbot reported: BUG: memory leak backtrace (crc 7b9fb9b4): map_create+0x322/0x11e0 kernel/bpf/syscall.c:1512 __sys_bpf+0x3556/0x3610 kernel/bpf/syscall.c:6131

PUBLISHED Reserved 2025-12-16 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

baefdbdf6812e120c9fba9cfb101d3656f478026 (git) before f0022551745d72fc0e7bc8601234d690dee2178d
affected

baefdbdf6812e120c9fba9cfb101d3656f478026 (git) before 688b745401ab16e2e1a3b504863f0a45fd345638
affected

Default status
affected

6.18
affected

Any version before 6.18
unaffected

6.18.2 (semver)
unaffected

6.19-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/f0022551745d72fc0e7bc8601234d690dee2178d

git.kernel.org/...c/688b745401ab16e2e1a3b504863f0a45fd345638

cve.org (CVE-2025-68355)

nvd.nist.gov (CVE-2025-68355)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.