CVE-2025-37929
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
20/05/2025
Last modified:
10/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays<br />
<br />
Commit a5951389e58d ("arm64: errata: Add newer ARM cores to the<br />
spectre_bhb_loop_affected() lists") added some additional CPUs to the<br />
Spectre-BHB workaround, including some new arrays for designs that<br />
require new &#39;k&#39; values for the workaround to be effective.<br />
<br />
Unfortunately, the new arrays omitted the sentinel entry and so<br />
is_midr_in_range_list() will walk off the end when it doesn&#39;t find a<br />
match. With UBSAN enabled, this leads to a crash during boot when<br />
is_midr_in_range_list() is inlined (which was more common prior to<br />
c8c2647e69be ("arm64: Make _midr_in_range_list() an exported<br />
function")):<br />
<br />
| Internal error: aarch64 BRK: 00000000f2000001 [#1] PREEMPT SMP<br />
| pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br />
| pc : spectre_bhb_loop_affected+0x28/0x30<br />
| lr : is_spectre_bhb_affected+0x170/0x190<br />
| [...]<br />
| Call trace:<br />
| spectre_bhb_loop_affected+0x28/0x30<br />
| update_cpu_capabilities+0xc0/0x184<br />
| init_cpu_features+0x188/0x1a4<br />
| cpuinfo_store_boot_cpu+0x4c/0x60<br />
| smp_prepare_boot_cpu+0x38/0x54<br />
| start_kernel+0x8c/0x478<br />
| __primary_switched+0xc8/0xd4<br />
| Code: 6b09011f 54000061 52801080 d65f03c0 (d4200020)<br />
| ---[ end trace 0000000000000000 ]---<br />
| Kernel panic - not syncing: aarch64 BRK: Fatal exception<br />
<br />
Add the missing sentinel entries.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.135 (including) | 6.1.138 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.88 (including) | 6.6.90 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.24 (including) | 6.12.28 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13.12 (including) | 6.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14.3 (including) | 6.14.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15.181:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/090c8714efe1c3c470301cc2f794c1ee2a57746c
- https://git.kernel.org/stable/c/333579202f09e260e8116321df4c55f80a19b160
- https://git.kernel.org/stable/c/3821cae9bd5a99a42d3d0be1b58e41f072cd4c4c
- https://git.kernel.org/stable/c/446289b8b36b2ee98dabf6388acbddcc33ed41be
- https://git.kernel.org/stable/c/6266b3509b2c6ebf2f9daf2239ff8eb60c5f5bd3
- https://git.kernel.org/stable/c/e68da90ac00d8b681561aeb8f5d6c47af3a04861
- https://git.kernel.org/stable/c/fee4d171451c1ad9e8aaf65fc0ab7d143a33bd72
- https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html



