We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-37929

arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays



Description

In the Linux kernel, the following vulnerability has been resolved: arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays Commit a5951389e58d ("arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() lists") added some additional CPUs to the Spectre-BHB workaround, including some new arrays for designs that require new 'k' values for the workaround to be effective. Unfortunately, the new arrays omitted the sentinel entry and so is_midr_in_range_list() will walk off the end when it doesn't find a match. With UBSAN enabled, this leads to a crash during boot when is_midr_in_range_list() is inlined (which was more common prior to c8c2647e69be ("arm64: Make  _midr_in_range_list() an exported function")): | Internal error: aarch64 BRK: 00000000f2000001 [#1] PREEMPT SMP | pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) | pc : spectre_bhb_loop_affected+0x28/0x30 | lr : is_spectre_bhb_affected+0x170/0x190 | [...] | Call trace: | spectre_bhb_loop_affected+0x28/0x30 | update_cpu_capabilities+0xc0/0x184 | init_cpu_features+0x188/0x1a4 | cpuinfo_store_boot_cpu+0x4c/0x60 | smp_prepare_boot_cpu+0x38/0x54 | start_kernel+0x8c/0x478 | __primary_switched+0xc8/0xd4 | Code: 6b09011f 54000061 52801080 d65f03c0 (d4200020) | ---[ end trace 0000000000000000 ]--- | Kernel panic - not syncing: aarch64 BRK: Fatal exception Add the missing sentinel entries.

Reserved 2025-04-16 | Published 2025-05-20 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

46e22de65eb45a67a68ddfe9301f79b0c3821ca8 before 6266b3509b2c6ebf2f9daf2239ff8eb60c5f5bd3
affected

a53b3599d9bf9375f9033f2aa1fa92714fb1d0f0 before 446289b8b36b2ee98dabf6388acbddcc33ed41be
affected

4117975672c4743cffaf32b6fd018cfacd1b420e before 3821cae9bd5a99a42d3d0be1b58e41f072cd4c4c
affected

9ca4fe357464bbdad0db67985275f2694df8dab5 before 090c8714efe1c3c470301cc2f794c1ee2a57746c
affected

e060dbb7393ed7bdfba6b5ea7566f9ef87381cfb before 333579202f09e260e8116321df4c55f80a19b160
affected

a5951389e58d2e816eed3dbec5877de9327fd881 before fee4d171451c1ad9e8aaf65fc0ab7d143a33bd72
affected

ed681e90fb244aa883b918c4d8be2614e816c6df
affected

Default status
unaffected

5.15.181 before 5.15.182
affected

6.1.135 before 6.1.138
affected

6.6.88 before 6.6.90
affected

6.12.24 before 6.12.28
affected

6.14.3 before 6.14.6
affected

References

git.kernel.org/...c/6266b3509b2c6ebf2f9daf2239ff8eb60c5f5bd3

git.kernel.org/...c/446289b8b36b2ee98dabf6388acbddcc33ed41be

git.kernel.org/...c/3821cae9bd5a99a42d3d0be1b58e41f072cd4c4c

git.kernel.org/...c/090c8714efe1c3c470301cc2f794c1ee2a57746c

git.kernel.org/...c/333579202f09e260e8116321df4c55f80a19b160

git.kernel.org/...c/fee4d171451c1ad9e8aaf65fc0ab7d143a33bd72

cve.org (CVE-2025-37929)

nvd.nist.gov (CVE-2025-37929)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-37929

Support options

Helpdesk Chat, Email, Knowledgebase