CVE-2025-22087
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
16/04/2025
Last modified:
31/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Fix array bounds error with may_goto<br />
<br />
may_goto uses an additional 8 bytes on the stack, which causes the<br />
interpreters[] array to go out of bounds when calculating index by<br />
stack_size.<br />
<br />
1. If a BPF program is rewritten, re-evaluate the stack size. For non-JIT<br />
cases, reject loading directly.<br />
<br />
2. For non-JIT cases, calculating interpreters[idx] may still cause<br />
out-of-bounds array access, and just warn about it.<br />
<br />
3. For jit_requested cases, the execution of bpf_func also needs to be<br />
warned. So move the definition of function __bpf_prog_ret0_warn out of<br />
the macro definition CONFIG_BPF_JIT_ALWAYS_ON.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.12.23 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.14.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



