CVE-2025-37929
📋 TL;DR
A missing sentinel entry in ARM64 Spectre-BHB workaround arrays in the Linux kernel causes a kernel panic during boot when UBSAN (Undefined Behavior Sanitizer) is enabled. This affects ARM64 systems running vulnerable Linux kernel versions, leading to denial of service rather than security compromise. The vulnerability is triggered during CPU capability initialization at boot time.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
System fails to boot completely, resulting in permanent denial of service requiring physical intervention or recovery procedures.
Likely Case
Boot failure on ARM64 systems with UBSAN enabled, preventing system startup and requiring kernel patching or configuration changes.
If Mitigated
No impact on systems without UBSAN enabled or with patched kernels.
🎯 Exploit Status
This is a crash vulnerability, not a traditional security exploit. It's triggered during normal boot process on vulnerable configurations.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits 090c8714efe1c3c470301cc2f794c1ee2a57746c, 333579202f09e260e8116321df4c55f80a19b160, 3821cae9bd5a99a42d3d0be1b58e41f072cd4c4c, 446289b8b36b2ee98dabf6388acbddcc33ed41be, or 6266b3509b2c6ebf2f9daf2239ff8eb60c5f5bd3
Vendor Advisory: https://git.kernel.org/stable/c/090c8714efe1c3c470301cc2f794c1ee2a57746c
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.
🔧 Temporary Workarounds
Disable UBSAN
linuxDisable Undefined Behavior Sanitizer in kernel configuration to prevent the crash
Rebuild kernel with CONFIG_UBSAN=n or boot with 'ubsan=0' kernel parameter
🧯 If You Can't Patch
- Ensure UBSAN is disabled in kernel configuration
- Use unaffected kernel versions or architectures
🔍 How to Verify
Check if Vulnerable:
Check if kernel was built with UBSAN enabled and if running on ARM64 architecture with affected kernel version range
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes one of the fix commits: 090c8714efe1c3c470301cc2f794c1ee2a57746c or related patches
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages during boot mentioning 'aarch64 BRK: Fatal exception' or 'spectre_bhb_loop_affected'
Network Indicators:
- System becoming unresponsive/unreachable after reboot
SIEM Query:
Search for kernel panic events with 'BRK' or 'spectre_bhb' in system logs
🔗 References
- https://git.kernel.org/stable/c/090c8714efe1c3c470301cc2f794c1ee2a57746c
- https://git.kernel.org/stable/c/333579202f09e260e8116321df4c55f80a19b160
- https://git.kernel.org/stable/c/3821cae9bd5a99a42d3d0be1b58e41f072cd4c4c
- https://git.kernel.org/stable/c/446289b8b36b2ee98dabf6388acbddcc33ed41be
- https://git.kernel.org/stable/c/6266b3509b2c6ebf2f9daf2239ff8eb60c5f5bd3
- https://git.kernel.org/stable/c/e68da90ac00d8b681561aeb8f5d6c47af3a04861
- https://git.kernel.org/stable/c/fee4d171451c1ad9e8aaf65fc0ab7d143a33bd72
- https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html