{"vulnerability": "CVE-2025-37948", "sightings": [{"uuid": "d8e71b33-d285-4f0f-a132-7815daab322b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-37948", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "e736f248-cc16-45c6-bc6f-0438b3686abf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37948", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19686", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37948\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\narm64: bpf: Add BHB mitigation to the epilogue for cBPF programs\n\nA malicious BPF program may manipulate the branch history to influence\nwhat the hardware speculates will happen next.\n\nOn exit from a BPF program, emit the BHB mititgation sequence.\n\nThis is only applied for 'classic' cBPF programs that are loaded by\nseccomp.\n\ud83d\udccf Published: 2025-05-20T16:01:44.452Z\n\ud83d\udccf Modified: 2025-06-27T10:21:20.431Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/c6a8735d841bcb7649734bb3a787bb174c67c0d8\n2. https://git.kernel.org/stable/c/993f63239c219696aef8887a4e7d3a16bf5a8ece\n3. https://git.kernel.org/stable/c/8fe5c37b0e08a97cf0210bb75970e945aaaeebab\n4. https://git.kernel.org/stable/c/42a20cf51011788f04cf2adbcd7681f02bdb6c27\n5. https://git.kernel.org/stable/c/38c345fd54afd9d6ed8d3fcddf3f6ea23887bf78\n6. https://git.kernel.org/stable/c/852b8ae934b5cbdc62496fa56ce9969aa2edda7f\n7. https://git.kernel.org/stable/c/0dfefc2ea2f29ced2416017d7e5b1253a54c2735", "creation_timestamp": "2025-06-27T10:49:52.000000Z"}]}