{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-22046","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-12-29T08:45:45.810Z","datePublished":"2025-04-16T14:12:06.454Z","dateUpdated":"2026-05-11T21:11:35.531Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:11:35.531Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nuprobes/x86: Harden uretprobe syscall trampoline check\n\nJann reported a possible issue when trampoline_check_ip returns\naddress near the bottom of the address space that is allowed to\ncall into the syscall if uretprobes are not set up:\n\n   https://lore.kernel.org/bpf/202502081235.5A6F352985@keescook/T/#m9d416df341b8fbc11737dacbcd29f0054413cbbf\n\nThough the mmap minimum address restrictions will typically prevent\ncreating mappings there, let's make sure uretprobe syscall checks\nfor that."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/x86/kernel/uprobes.c","include/linux/uprobes.h","kernel/events/uprobes.c"],"versions":[{"version":"ff474a78cef5cb5f32be52fe25b78441327a2e7c","lessThan":"c35771342e47d58ab9433f3be1c3c30f2c5fa4f3","status":"affected","versionType":"git"},{"version":"ff474a78cef5cb5f32be52fe25b78441327a2e7c","lessThan":"b0065d712049c87e1994c6eac00c6a637e39b325","status":"affected","versionType":"git"},{"version":"ff474a78cef5cb5f32be52fe25b78441327a2e7c","lessThan":"d4e48b8d59fe162938a5004ace698c847e6a3207","status":"affected","versionType":"git"},{"version":"ff474a78cef5cb5f32be52fe25b78441327a2e7c","lessThan":"fa6192adc32f4fdfe5b74edd5b210e12afd6ecc0","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/x86/kernel/uprobes.c","include/linux/uprobes.h","kernel/events/uprobes.c"],"versions":[{"version":"6.11","status":"affected"},{"version":"0","lessThan":"6.11","status":"unaffected","versionType":"semver"},{"version":"6.12.23","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13.11","lessThanOrEqual":"6.13.*","status":"unaffected","versionType":"semver"},{"version":"6.14.2","lessThanOrEqual":"6.14.*","status":"unaffected","versionType":"semver"},{"version":"6.15","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11","versionEndExcluding":"6.12.23"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11","versionEndExcluding":"6.13.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11","versionEndExcluding":"6.14.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11","versionEndExcluding":"6.15"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/c35771342e47d58ab9433f3be1c3c30f2c5fa4f3"},{"url":"https://git.kernel.org/stable/c/b0065d712049c87e1994c6eac00c6a637e39b325"},{"url":"https://git.kernel.org/stable/c/d4e48b8d59fe162938a5004ace698c847e6a3207"},{"url":"https://git.kernel.org/stable/c/fa6192adc32f4fdfe5b74edd5b210e12afd6ecc0"}],"title":"uprobes/x86: Harden uretprobe syscall trampoline check","x_generator":{"engine":"bippy-1.2.0"}}}}