In the Linux kernel, the following vulnerability has been resolved:
arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs
A malicious BPF program may manipulate the branch history to influence
what the hardware speculates will happen next.
On exit from a BPF program, emit the BHB mititgation sequence.
This is only applied for 'classic' cBPF programs that are loaded by
seccomp.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 27 Jun 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sat, 14 Jun 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 22 May 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 20 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs A malicious BPF program may manipulate the branch history to influence what the hardware speculates will happen next. On exit from a BPF program, emit the BHB mititgation sequence. This is only applied for 'classic' cBPF programs that are loaded by seccomp. | |
Title | arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-05-20T16:01:44.452Z
Updated: 2025-06-27T10:21:20.431Z
Reserved: 2025-04-16T04:51:23.972Z
Link: CVE-2025-37948

No data.

Status : Awaiting Analysis
Published: 2025-05-20T16:15:32.800
Modified: 2025-06-27T11:15:24.947
Link: CVE-2025-37948
