In the Linux kernel, the following vulnerability has been resolved: bpf: Fix potential array overflow in bpftrampolinegetprogs() The cnt value in the 'cnt >= BPFMAXTRAMPPROGS' check does not include BPFTRAMPMODIFYRETURN bpf programs, so the number of the attached BPFTRAMPMODIFYRETURN bpf programs in a trampoline can exceed BPFMAXTRAMPPROGS. When this happens, the assignment '*progs++ = aux->prog' in bpftrampolinegetprogs() will cause progs array overflow as the progs field in the bpftrampprogs struct can only hold at most BPFMAXTRAMP_PROGS bpf programs.