HomeDefectsLIN1021-20534
Acknowledged

LIN1021-20534 : Security Advisory - linux - CVE-2025-68378

Created: Dec 25, 2025    Updated: Feb 18, 2026
Resolved Date: Feb 1, 2026
Found In Version: 10.21.20.2
Severity: Standard
Applicable for: Wind River Linux LTS 21
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix stackmap overflow check in __bpf_get_stackid()

Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid()
when copying stack trace data. The issue occurs when the perf trace
contains more stack entries than the stack map bucket can hold,
leading to an out-of-bounds write in the bucket's data array.

========Wind River Notice========

Customers can use kernel.unprivileged_bpf_disabled sysctl to prevent unprivileged users from being able to use eBPF. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.

Inspect kernel.unprivileged_bpf_disabled sysctl with the command:

cat /proc/sys/kernel/unprivileged_bpf_disabled
The setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.

echo 1 > /proc/sys/kernel/unprivileged_bpf_disabled
 
For more details, please refer to Linux kernel official document:
[https://docs.kernel.org/admin-guide/sysctl/kernel.html#unprivileged-bpf-disabled]

CVEs