-
CVE-2025-38586
- EPSS 0.03%
- Published 19.08.2025 17:15:36
- Last modified 20.08.2025 14:40:17
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Fix fp initialization for exception boundary In the ARM64 BPF JIT when prog->aux->exception_boundary is set for a BPF program, find_used_callee_regs() is not called because for a program acting as exception boundary, all callee saved registers are saved. find_used_callee_regs() sets `ctx->fp_used = true;` when it sees FP being used in any of the instructions. For programs acting as exception boundary, ctx->fp_used remains false even if frame pointer is used by the program and therefore, FP is not set-up for such programs in the prologue. This can cause the kernel to crash due to a pagefault. Fix it by setting ctx->fp_used = true for exception boundary programs as fp is always saved in such programs.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
0dbef493cae7d451f740558665893c000adb2321
Version
5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff
Status
affected
Version <
e23184725dbb72d5d02940222eee36dbba2aa422
Version
5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff
Status
affected
Version <
1ce30231e0a2c8c361ee5f8f7f265fc17130adce
Version
5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff
Status
affected
Version <
b114fcee766d5101eada1aca7bb5fd0a86c89b35
Version
5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.12
Status
affected
Version <
6.12
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.055 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|