We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38489

s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again



Description

In the Linux kernel, the following vulnerability has been resolved: s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again Commit 7ded842b356d ("s390/bpf: Fix bpf_plt pointer arithmetic") has accidentally removed the critical piece of commit c730fce7c70c ("s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL"), causing intermittent kernel panics in e.g. perf's on_switch() prog to reappear. Restore the fix and add a comment.

Reserved 2025-04-16 | Published 2025-07-28 | Updated 2025-07-28 | Assigner Linux

Product status

Default status
unaffected

c3062bdb859b6e2567e7f5c8cde20c0250bb130f before 0c7b20f7785cfdd59403333612c90b458b12307c
affected

7ded842b356d151ece8ac4985940438e6d3998bb before d5629d1af0600f8cc7c9245e8d832a66358ef889
affected

7ded842b356d151ece8ac4985940438e6d3998bb before a4f9c7846b1ac428921ce9676b1b8c80ed60093c
affected

7ded842b356d151ece8ac4985940438e6d3998bb before 6a5abf8cf182f577c7ae6c62f14debc9754ec986
affected

d3d74e45a060d218fe4b0c9174f0a77517509d8e
affected

Default status
affected

6.9
affected

Any version before 6.9
unaffected

6.6.100
unaffected

6.12.40
unaffected

6.15.8
unaffected

6.16
unaffected

References

git.kernel.org/...c/0c7b20f7785cfdd59403333612c90b458b12307c

git.kernel.org/...c/d5629d1af0600f8cc7c9245e8d832a66358ef889

git.kernel.org/...c/a4f9c7846b1ac428921ce9676b1b8c80ed60093c

git.kernel.org/...c/6a5abf8cf182f577c7ae6c62f14debc9754ec986

cve.org (CVE-2025-38489)

nvd.nist.gov (CVE-2025-38489)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38489

Support options

Helpdesk Chat, Email, Knowledgebase