Home

Description

In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Fix fp initialization for exception boundary In the ARM64 BPF JIT when prog->aux->exception_boundary is set for a BPF program, find_used_callee_regs() is not called because for a program acting as exception boundary, all callee saved registers are saved. find_used_callee_regs() sets `ctx->fp_used = true;` when it sees FP being used in any of the instructions. For programs acting as exception boundary, ctx->fp_used remains false even if frame pointer is used by the program and therefore, FP is not set-up for such programs in the prologue. This can cause the kernel to crash due to a pagefault. Fix it by setting ctx->fp_used = true for exception boundary programs as fp is always saved in such programs.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-19 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff before 0dbef493cae7d451f740558665893c000adb2321
affected

5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff before e23184725dbb72d5d02940222eee36dbba2aa422
affected

5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff before 1ce30231e0a2c8c361ee5f8f7f265fc17130adce
affected

5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff before b114fcee766d5101eada1aca7bb5fd0a86c89b35
affected

Default status
affected

6.12
affected

Any version before 6.12
unaffected

6.12.42
unaffected

6.15.10
unaffected

6.16.1
unaffected

6.17
unaffected

References

git.kernel.org/...c/0dbef493cae7d451f740558665893c000adb2321

git.kernel.org/...c/e23184725dbb72d5d02940222eee36dbba2aa422

git.kernel.org/...c/1ce30231e0a2c8c361ee5f8f7f265fc17130adce

git.kernel.org/...c/b114fcee766d5101eada1aca7bb5fd0a86c89b35

cve.org (CVE-2025-38586)

nvd.nist.gov (CVE-2025-38586)

Download JSON