We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs A malicious BPF program may manipulate the branch history to influence what the hardware speculates will happen next. On exit from a BPF program, emit the BHB mititgation sequence. This is only applied for 'classic' cBPF programs that are loaded by seccomp.
Reserved 2025-04-16 | Published 2025-05-20 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/8fe5c37b0e08a97cf0210bb75970e945aaaeebab
git.kernel.org/...c/42a20cf51011788f04cf2adbcd7681f02bdb6c27
git.kernel.org/...c/38c345fd54afd9d6ed8d3fcddf3f6ea23887bf78
git.kernel.org/...c/852b8ae934b5cbdc62496fa56ce9969aa2edda7f
git.kernel.org/...c/0dfefc2ea2f29ced2416017d7e5b1253a54c2735
Support options