In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix potential array overflow in bpftrampolineget_progs()
The cnt value in the 'cnt >= BPFMAXTRAMPPROGS' check does not include BPFTRAMPMODIFYRETURN bpf programs, so the number of the attached BPFTRAMPMODIFYRETURN bpf programs in a trampoline can exceed BPFMAXTRAMPPROGS.
When this happens, the assignment '*progs++ = aux->prog' in bpftrampolinegetprogs() will cause progs array overflow as the progs field in the bpftrampprogs struct can only hold at most BPFMAXTRAMPPROGS bpf programs.