In the Linux kernel, the following vulnerability has been resolved: arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users Support for eBPF programs loaded by unprivileged users is typically disabled. This means only cBPF programs need to be mitigated for BHB. In addition, only mitigate cBPF programs that were loaded by an unprivileged user. Privileged users can also load the same program via eBPF, making the mitigation pointless.
https://git.kernel.org/stable/c/f300769ead032513a68e4a02e806393402e626f8
https://git.kernel.org/stable/c/e5f5100f1c64ac6c72671b2cf6b46542fce93706
https://git.kernel.org/stable/c/80251f62028f1ab2e09be5ca3123f84e8b00389a
https://git.kernel.org/stable/c/6e52d043f7dbf1839a24a3fab2b12b0d3839de7a
https://git.kernel.org/stable/c/477481c4348268136227348984b6699d6370b685