Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-73108.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-73108
Upstream
Published
2025-12-24T13:16:29Z
Modified
2026-04-01T05:22:15.910950Z
Summary
CVE-2025-68742 affecting package kernel for versions less than 6.6.121.1-1
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix invalid prog->stats access when updateeffectiveprogs fails

Syzkaller triggers an invalid memory access issue following fault injection in updateeffectiveprogs. The issue can be described as follows:

_cgroupbpfdetach updateeffectiveprogs computeeffectiveprogs bpfprogarrayalloc <-- fault inject purgeeffectiveprogs /* change to dummybpfprog */ array->items[index] = &dummybpfprog.prog

---softirq start--- __do_softirq ... __cgroupbpfrunfilterskb __bpfprogrunsavecb bpfprogrun stats = thiscpuptr(prog->stats) /* invalid memory access */ flags = u64statsupdatebeginirqsave(&stats->syncp) ---softirq end---

staticbranchdec(&cgroupbpfenabled_key[atype])

The reason is that fault injection caused updateeffectiveprogs to fail and then changed the original prog into dummybpfprog.prog in purgeeffectiveprogs. Then a softirq came, and accessing the members of dummybpfprog.prog in the softirq triggers invalid mem access.

To fix it, skip updating stats when stats is NULL.

References

Affected packages

Azure Linux:3 / kernel

Package

Name
kernel
Purl
pkg:rpm/azure-linux/kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.121.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-73108.json"