In the Linux kernel, the following vulnerability has been resolved: arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs A malicious BPF program may manipulate the branch history to influence what the hardware speculates will happen next. On exit from a BPF program, emit the BHB mititgation sequence. This is only applied for 'classic' cBPF programs that are loaded by seccomp.
https://git.kernel.org/stable/c/8fe5c37b0e08a97cf0210bb75970e945aaaeebab
https://git.kernel.org/stable/c/852b8ae934b5cbdc62496fa56ce9969aa2edda7f
https://git.kernel.org/stable/c/42a20cf51011788f04cf2adbcd7681f02bdb6c27
https://git.kernel.org/stable/c/38c345fd54afd9d6ed8d3fcddf3f6ea23887bf78
https://git.kernel.org/stable/c/0dfefc2ea2f29ced2416017d7e5b1253a54c2735