We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again Commit 7ded842b356d ("s390/bpf: Fix bpf_plt pointer arithmetic") has accidentally removed the critical piece of commit c730fce7c70c ("s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL"), causing intermittent kernel panics in e.g. perf's on_switch() prog to reappear. Restore the fix and add a comment.
Reserved 2025-04-16 | Published 2025-07-28 | Updated 2025-07-28 | Assigner Linuxgit.kernel.org/...c/0c7b20f7785cfdd59403333612c90b458b12307c
git.kernel.org/...c/d5629d1af0600f8cc7c9245e8d832a66358ef889
git.kernel.org/...c/a4f9c7846b1ac428921ce9676b1b8c80ed60093c
git.kernel.org/...c/6a5abf8cf182f577c7ae6c62f14debc9754ec986
Support options