blob: feb19a8ab307190bf90a81e44242d175ebef67d8 [file] [log] [blame]
{
"containers": {
"cna": {
"providerMetadata": {
"orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
},
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays\n\nCommit a5951389e58d (\"arm64: errata: Add newer ARM cores to the\nspectre_bhb_loop_affected() lists\") added some additional CPUs to the\nSpectre-BHB workaround, including some new arrays for designs that\nrequire new 'k' values for the workaround to be effective.\n\nUnfortunately, the new arrays omitted the sentinel entry and so\nis_midr_in_range_list() will walk off the end when it doesn't find a\nmatch. With UBSAN enabled, this leads to a crash during boot when\nis_midr_in_range_list() is inlined (which was more common prior to\nc8c2647e69be (\"arm64: Make  _midr_in_range_list() an exported\nfunction\")):\n\n | Internal error: aarch64 BRK: 00000000f2000001 [#1] PREEMPT SMP\n | pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n | pc : spectre_bhb_loop_affected+0x28/0x30\n | lr : is_spectre_bhb_affected+0x170/0x190\n | [...]\n | Call trace:\n | spectre_bhb_loop_affected+0x28/0x30\n | update_cpu_capabilities+0xc0/0x184\n | init_cpu_features+0x188/0x1a4\n | cpuinfo_store_boot_cpu+0x4c/0x60\n | smp_prepare_boot_cpu+0x38/0x54\n | start_kernel+0x8c/0x478\n | __primary_switched+0xc8/0xd4\n | Code: 6b09011f 54000061 52801080 d65f03c0 (d4200020)\n | ---[ end trace 0000000000000000 ]---\n | Kernel panic - not syncing: aarch64 BRK: Fatal exception\n\nAdd the missing sentinel entries."
}
],
"affected": [
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"arch/arm64/kernel/proton-pack.c"
],
"versions": [
{
"version": "46e22de65eb45a67a68ddfe9301f79b0c3821ca8",
"lessThan": "6266b3509b2c6ebf2f9daf2239ff8eb60c5f5bd3",
"status": "affected",
"versionType": "git"
},
{
"version": "a53b3599d9bf9375f9033f2aa1fa92714fb1d0f0",
"lessThan": "446289b8b36b2ee98dabf6388acbddcc33ed41be",
"status": "affected",
"versionType": "git"
},
{
"version": "4117975672c4743cffaf32b6fd018cfacd1b420e",
"lessThan": "3821cae9bd5a99a42d3d0be1b58e41f072cd4c4c",
"status": "affected",
"versionType": "git"
},
{
"version": "9ca4fe357464bbdad0db67985275f2694df8dab5",
"lessThan": "090c8714efe1c3c470301cc2f794c1ee2a57746c",
"status": "affected",
"versionType": "git"
},
{
"version": "e060dbb7393ed7bdfba6b5ea7566f9ef87381cfb",
"lessThan": "333579202f09e260e8116321df4c55f80a19b160",
"status": "affected",
"versionType": "git"
},
{
"version": "a5951389e58d2e816eed3dbec5877de9327fd881",
"lessThan": "fee4d171451c1ad9e8aaf65fc0ab7d143a33bd72",
"status": "affected",
"versionType": "git"
},
{
"version": "ed681e90fb244aa883b918c4d8be2614e816c6df",
"status": "affected",
"versionType": "git"
}
]
},
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"arch/arm64/kernel/proton-pack.c"
],
"versions": [
{
"version": "5.15.181",
"lessThan": "5.15.182",
"status": "affected",
"versionType": "semver"
},
{
"version": "6.1.135",
"lessThan": "6.1.138",
"status": "affected",
"versionType": "semver"
},
{
"version": "6.6.88",
"lessThan": "6.6.90",
"status": "affected",
"versionType": "semver"
},
{
"version": "6.12.24",
"lessThan": "6.12.28",
"status": "affected",
"versionType": "semver"
},
{
"version": "6.14.3",
"lessThan": "6.14.6",
"status": "affected",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.181",
"versionEndExcluding": "5.15.182"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.135",
"versionEndExcluding": "6.1.138"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.88",
"versionEndExcluding": "6.6.90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.12.24",
"versionEndExcluding": "6.12.28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.14.3",
"versionEndExcluding": "6.14.6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13.12"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/6266b3509b2c6ebf2f9daf2239ff8eb60c5f5bd3"
},
{
"url": "https://git.kernel.org/stable/c/446289b8b36b2ee98dabf6388acbddcc33ed41be"
},
{
"url": "https://git.kernel.org/stable/c/3821cae9bd5a99a42d3d0be1b58e41f072cd4c4c"
},
{
"url": "https://git.kernel.org/stable/c/090c8714efe1c3c470301cc2f794c1ee2a57746c"
},
{
"url": "https://git.kernel.org/stable/c/333579202f09e260e8116321df4c55f80a19b160"
},
{
"url": "https://git.kernel.org/stable/c/fee4d171451c1ad9e8aaf65fc0ab7d143a33bd72"
}
],
"title": "arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2025-37929",
"requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}