CVE-2025-22087

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-22087
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22087.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-22087
Downstream
Published
2025-04-16T14:12:35.359Z
Modified
2025-12-02T08:31:16.379452Z
Summary
bpf: Fix array bounds error with may_goto
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix array bounds error with may_goto

maygoto uses an additional 8 bytes on the stack, which causes the interpreters[] array to go out of bounds when calculating index by stacksize.

  1. If a BPF program is rewritten, re-evaluate the stack size. For non-JIT cases, reject loading directly.

  2. For non-JIT cases, calculating interpreters[idx] may still cause out-of-bounds array access, and just warn about it.

  3. For jitrequested cases, the execution of bpffunc also needs to be warned. So move the definition of function _bpfprogret0warn out of the macro definition CONFIGBPFJITALWAYSON.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22087.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
011832b97b311bb9e3c27945bc0d1089a14209c9
Fixed
19e6817f84000d0b06f09fd69ebd56217842c122
Fixed
4524b7febdd55fb99ae2e1f48db64019fa69e643
Fixed
1a86ae57b2600e5749f5f674e9d4296ac00c69a8
Fixed
6ebc5030e0c5a698f1dd9a6684cddf6ccaed64a0

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.10
v6.12.11
v6.12.12
v6.12.13
v6.12.14
v6.12.15
v6.12.16
v6.12.17
v6.12.18
v6.12.19
v6.12.2
v6.12.20
v6.12.21
v6.12.22
v6.12.3
v6.12.4
v6.12.5
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.13.1
v6.13.10
v6.13.2
v6.13.3
v6.13.4
v6.13.5
v6.13.6
v6.13.7
v6.13.8
v6.13.9
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.14.1
v6.8
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22087.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.9.0
Fixed
6.12.23
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.11
Type
ECOSYSTEM
Events
Introduced
6.14.0
Fixed
6.14.2

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22087.json"