CVE-2025-22087

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
16/04/2025
Last modified:
31/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Fix array bounds error with may_goto<br /> <br /> may_goto uses an additional 8 bytes on the stack, which causes the<br /> interpreters[] array to go out of bounds when calculating index by<br /> stack_size.<br /> <br /> 1. If a BPF program is rewritten, re-evaluate the stack size. For non-JIT<br /> cases, reject loading directly.<br /> <br /> 2. For non-JIT cases, calculating interpreters[idx] may still cause<br /> out-of-bounds array access, and just warn about it.<br /> <br /> 3. For jit_requested cases, the execution of bpf_func also needs to be<br /> warned. So move the definition of function __bpf_prog_ret0_warn out of<br /> the macro definition CONFIG_BPF_JIT_ALWAYS_ON.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.12.23 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.13.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.14 (including) 6.14.2 (excluding)