CVE-2025-37963

In the Linux kernel, the following vulnerability has been resolved: arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users Support for eBPF programs loaded by unprivileged users is typically disabled. This means only cBPF programs need to be mitigated for BHB. In addition, only mitigate cBPF programs that were loaded by an unprivileged user. Privileged users can also load the same program via eBPF, making the mitigation pointless.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 20:29

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/038866e01ea5e5a3d948898ac216e531e7848669 - () https://git.kernel.org/stable/c/038866e01ea5e5a3d948898ac216e531e7848669 - Patch
References () https://git.kernel.org/stable/c/477481c4348268136227348984b6699d6370b685 - () https://git.kernel.org/stable/c/477481c4348268136227348984b6699d6370b685 - Patch
References () https://git.kernel.org/stable/c/6e52d043f7dbf1839a24a3fab2b12b0d3839de7a - () https://git.kernel.org/stable/c/6e52d043f7dbf1839a24a3fab2b12b0d3839de7a - Patch
References () https://git.kernel.org/stable/c/80251f62028f1ab2e09be5ca3123f84e8b00389a - () https://git.kernel.org/stable/c/80251f62028f1ab2e09be5ca3123f84e8b00389a - Patch
References () https://git.kernel.org/stable/c/df53d418709205450a02bb4d71cbfb4ff86f2c1e - () https://git.kernel.org/stable/c/df53d418709205450a02bb4d71cbfb4ff86f2c1e - Patch
References () https://git.kernel.org/stable/c/e5f5100f1c64ac6c72671b2cf6b46542fce93706 - () https://git.kernel.org/stable/c/e5f5100f1c64ac6c72671b2cf6b46542fce93706 - Patch
References () https://git.kernel.org/stable/c/f300769ead032513a68e4a02e806393402e626f8 - () https://git.kernel.org/stable/c/f300769ead032513a68e4a02e806393402e626f8 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html -

03 Nov 2025, 18:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -

27 Jun 2025, 11:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/038866e01ea5e5a3d948898ac216e531e7848669 -
  • () https://git.kernel.org/stable/c/df53d418709205450a02bb4d71cbfb4ff86f2c1e -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: bpf: Mitigar solo programas cBPF cargados por usuarios sin privilegios. La compatibilidad con programas eBPF cargados por usuarios sin privilegios suele estar deshabilitada. Esto significa que solo es necesario mitigar los programas cBPF para BHB. Además, solo se deben mitigar los programas cBPF cargados por un usuario sin privilegios. Los usuarios con privilegios también pueden cargar el mismo programa mediante eBPF, lo que hace que la mitigación sea inútil.

20 May 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-20 16:15

Updated : 2025-12-16 20:29


NVD link : CVE-2025-37963

Mitre link : CVE-2025-37963

CVE.ORG link : CVE-2025-37963


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel