{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T01:51:59.029","vulnerabilities":[{"cve":{"id":"CVE-2025-68744","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-24T13:16:29.343","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Free special fields when update [lru_,]percpu_hash maps\n\nAs [lru_,]percpu_hash maps support BPF_KPTR_{REF,PERCPU}, missing\ncalls to 'bpf_obj_free_fields()' in 'pcpu_copy_value()' could cause the\nmemory referenced by BPF_KPTR_{REF,PERCPU} fields to be held until the\nmap gets freed.\n\nFix this by calling 'bpf_obj_free_fields()' after\n'copy_map_value[,_long]()' in 'pcpu_copy_value()'."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/3bf1378747e251571e0de15e7e0a6bf2919044e7","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/4a03d69cece145e4fb527464be29c3806aa3221e","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/6af6e49a76c9af7d42eb923703e7648cb2bf401a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/96a5cb7072cabbac5c66ac9318242c3bdceebb68","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/994d6303ed0b84cbc795bb5becf7ed6de40d3f3c","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}