SB2025052187 - Input validation error in Linux kernel include asm
Published: May 21, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2025-37948)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pr_fmt(), build_plt(), build_epilogue() and bpf_int_jit_compile() functions in arch/arm64/net/bpf_jit_comp.c, within the this_cpu_set_vectors() function in arch/arm64/kernel/proton-pack.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/0dfefc2ea2f29ced2416017d7e5b1253a54c2735
- https://git.kernel.org/stable/c/38c345fd54afd9d6ed8d3fcddf3f6ea23887bf78
- https://git.kernel.org/stable/c/42a20cf51011788f04cf2adbcd7681f02bdb6c27
- https://git.kernel.org/stable/c/852b8ae934b5cbdc62496fa56ce9969aa2edda7f
- https://git.kernel.org/stable/c/8fe5c37b0e08a97cf0210bb75970e945aaaeebab