{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-37929","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:23.970Z","datePublished":"2025-05-20T15:21:55.253Z","dateUpdated":"2026-05-11T21:17:50.260Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:17:50.260Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\narm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays\n\nCommit a5951389e58d (\"arm64: errata: Add newer ARM cores to the\nspectre_bhb_loop_affected() lists\") added some additional CPUs to the\nSpectre-BHB workaround, including some new arrays for designs that\nrequire new 'k' values for the workaround to be effective.\n\nUnfortunately, the new arrays omitted the sentinel entry and so\nis_midr_in_range_list() will walk off the end when it doesn't find a\nmatch. With UBSAN enabled, this leads to a crash during boot when\nis_midr_in_range_list() is inlined (which was more common prior to\nc8c2647e69be (\"arm64: Make  _midr_in_range_list() an exported\nfunction\")):\n\n |  Internal error: aarch64 BRK: 00000000f2000001 [#1] PREEMPT SMP\n |  pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n |  pc : spectre_bhb_loop_affected+0x28/0x30\n |  lr : is_spectre_bhb_affected+0x170/0x190\n | [...]\n |  Call trace:\n |   spectre_bhb_loop_affected+0x28/0x30\n |   update_cpu_capabilities+0xc0/0x184\n |   init_cpu_features+0x188/0x1a4\n |   cpuinfo_store_boot_cpu+0x4c/0x60\n |   smp_prepare_boot_cpu+0x38/0x54\n |   start_kernel+0x8c/0x478\n |   __primary_switched+0xc8/0xd4\n |  Code: 6b09011f 54000061 52801080 d65f03c0 (d4200020)\n |  ---[ end trace 0000000000000000 ]---\n |  Kernel panic - not syncing: aarch64 BRK: Fatal exception\n\nAdd the missing sentinel entries."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/arm64/kernel/proton-pack.c"],"versions":[{"version":"4a2f3d8260a996bc43dcc1ce49ac594db54f4b3e","lessThan":"e68da90ac00d8b681561aeb8f5d6c47af3a04861","status":"affected","versionType":"git"},{"version":"46e22de65eb45a67a68ddfe9301f79b0c3821ca8","lessThan":"6266b3509b2c6ebf2f9daf2239ff8eb60c5f5bd3","status":"affected","versionType":"git"},{"version":"a53b3599d9bf9375f9033f2aa1fa92714fb1d0f0","lessThan":"446289b8b36b2ee98dabf6388acbddcc33ed41be","status":"affected","versionType":"git"},{"version":"4117975672c4743cffaf32b6fd018cfacd1b420e","lessThan":"3821cae9bd5a99a42d3d0be1b58e41f072cd4c4c","status":"affected","versionType":"git"},{"version":"9ca4fe357464bbdad0db67985275f2694df8dab5","lessThan":"090c8714efe1c3c470301cc2f794c1ee2a57746c","status":"affected","versionType":"git"},{"version":"e060dbb7393ed7bdfba6b5ea7566f9ef87381cfb","lessThan":"333579202f09e260e8116321df4c55f80a19b160","status":"affected","versionType":"git"},{"version":"a5951389e58d2e816eed3dbec5877de9327fd881","lessThan":"fee4d171451c1ad9e8aaf65fc0ab7d143a33bd72","status":"affected","versionType":"git"},{"version":"ed681e90fb244aa883b918c4d8be2614e816c6df","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/arm64/kernel/proton-pack.c"],"versions":[{"version":"5.15.181","lessThan":"5.15.182","status":"affected","versionType":"semver"},{"version":"6.1.135","lessThan":"6.1.138","status":"affected","versionType":"semver"},{"version":"6.6.88","lessThan":"6.6.90","status":"affected","versionType":"semver"},{"version":"6.12.24","lessThan":"6.12.28","status":"affected","versionType":"semver"},{"version":"6.14.3","lessThan":"6.14.6","status":"affected","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.181","versionEndExcluding":"5.15.182"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.135","versionEndExcluding":"6.1.138"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.88","versionEndExcluding":"6.6.90"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12.24","versionEndExcluding":"6.12.28"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.14.3","versionEndExcluding":"6.14.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13.12"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/e68da90ac00d8b681561aeb8f5d6c47af3a04861"},{"url":"https://git.kernel.org/stable/c/6266b3509b2c6ebf2f9daf2239ff8eb60c5f5bd3"},{"url":"https://git.kernel.org/stable/c/446289b8b36b2ee98dabf6388acbddcc33ed41be"},{"url":"https://git.kernel.org/stable/c/3821cae9bd5a99a42d3d0be1b58e41f072cd4c4c"},{"url":"https://git.kernel.org/stable/c/090c8714efe1c3c470301cc2f794c1ee2a57746c"},{"url":"https://git.kernel.org/stable/c/333579202f09e260e8116321df4c55f80a19b160"},{"url":"https://git.kernel.org/stable/c/fee4d171451c1ad9e8aaf65fc0ab7d143a33bd72"}],"title":"arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:57:27.644Z"}}]}}