CVE-2025-37963

Source
https://cve.org/CVERecord?id=CVE-2025-37963
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37963.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37963
Downstream
Related
Published
2025-05-20T16:01:55.322Z
Modified
2026-03-20T12:42:35.759710Z
Summary
arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users
Details

In the Linux kernel, the following vulnerability has been resolved:

arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users

Support for eBPF programs loaded by unprivileged users is typically disabled. This means only cBPF programs need to be mitigated for BHB.

In addition, only mitigate cBPF programs that were loaded by an unprivileged user. Privileged users can also load the same program via eBPF, making the mitigation pointless.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37963.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0be7320a635c2e434e8b67e0e9474a85ceb421c4
Fixed
038866e01ea5e5a3d948898ac216e531e7848669
Fixed
df53d418709205450a02bb4d71cbfb4ff86f2c1e
Fixed
6e52d043f7dbf1839a24a3fab2b12b0d3839de7a
Fixed
80251f62028f1ab2e09be5ca3123f84e8b00389a
Fixed
e5f5100f1c64ac6c72671b2cf6b46542fce93706
Fixed
477481c4348268136227348984b6699d6370b685
Fixed
f300769ead032513a68e4a02e806393402e626f8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37963.json"