CVE-2025-37948

high

Description

In the Linux kernel, the following vulnerability has been resolved: arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs A malicious BPF program may manipulate the branch history to influence what the hardware speculates will happen next. On exit from a BPF program, emit the BHB mititgation sequence. This is only applied for 'classic' cBPF programs that are loaded by seccomp.

References

https://git.kernel.org/stable/c/8fe5c37b0e08a97cf0210bb75970e945aaaeebab

https://git.kernel.org/stable/c/852b8ae934b5cbdc62496fa56ce9969aa2edda7f

https://git.kernel.org/stable/c/42a20cf51011788f04cf2adbcd7681f02bdb6c27

https://git.kernel.org/stable/c/38c345fd54afd9d6ed8d3fcddf3f6ea23887bf78

https://git.kernel.org/stable/c/0dfefc2ea2f29ced2416017d7e5b1253a54c2735

Details

Source: Mitre, NVD

Published: 2025-05-20

Updated: 2025-05-21

Risk Information

CVSS v2

Base Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:N

Severity: Low

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Severity: High

EPSS

EPSS: 0.00018