In the Linux kernel, the following vulnerability has been resolved:
arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users
Support for eBPF programs loaded by unprivileged users is typically
disabled. This means only cBPF programs need to be mitigated for BHB.
In addition, only mitigate cBPF programs that were loaded by an
unprivileged user. Privileged users can also load the same program
via eBPF, making the mitigation pointless.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
16 Dec 2025, 20:29
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/038866e01ea5e5a3d948898ac216e531e7848669 - Patch | |
| References | () https://git.kernel.org/stable/c/477481c4348268136227348984b6699d6370b685 - Patch | |
| References | () https://git.kernel.org/stable/c/6e52d043f7dbf1839a24a3fab2b12b0d3839de7a - Patch | |
| References | () https://git.kernel.org/stable/c/80251f62028f1ab2e09be5ca3123f84e8b00389a - Patch | |
| References | () https://git.kernel.org/stable/c/df53d418709205450a02bb4d71cbfb4ff86f2c1e - Patch | |
| References | () https://git.kernel.org/stable/c/e5f5100f1c64ac6c72671b2cf6b46542fce93706 - Patch | |
| References | () https://git.kernel.org/stable/c/f300769ead032513a68e4a02e806393402e626f8 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* |
03 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jun 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
20 May 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-20 16:15
Updated : 2025-12-16 20:29
NVD link : CVE-2025-37963
Mitre link : CVE-2025-37963
CVE.ORG link : CVE-2025-37963
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
