We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users Support for eBPF programs loaded by unprivileged users is typically disabled. This means only cBPF programs need to be mitigated for BHB. In addition, only mitigate cBPF programs that were loaded by an unprivileged user. Privileged users can also load the same program via eBPF, making the mitigation pointless.
Reserved 2025-04-16 | Published 2025-05-20 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/6e52d043f7dbf1839a24a3fab2b12b0d3839de7a
git.kernel.org/...c/80251f62028f1ab2e09be5ca3123f84e8b00389a
git.kernel.org/...c/e5f5100f1c64ac6c72671b2cf6b46542fce93706
git.kernel.org/...c/477481c4348268136227348984b6699d6370b685
git.kernel.org/...c/f300769ead032513a68e4a02e806393402e626f8
Support options