In the Linux kernel, the following vulnerability has been resolved:
s390/bpf: Fix bpfarchtextpoke() with newaddr == NULL again
Commit 7ded842b356d ("s390/bpf: Fix bpfplt pointer arithmetic") has accidentally removed the critical piece of commit c730fce7c70c ("s390/bpf: Fix bpfarchtextpoke() with newaddr == NULL"), causing intermittent kernel panics in e.g. perf's onswitch() prog to reappear.
Restore the fix and add a comment.
[ { "signature_type": "Function", "id": "CVE-2025-38489-131c6cfe", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a5abf8cf182f577c7ae6c62f14debc9754ec986", "signature_version": "v1", "target": { "function": "bpf_jit_plt", "file": "arch/s390/net/bpf_jit_comp.c" }, "digest": { "function_hash": "221477597312466563834240456894000525244", "length": 179.0 }, "deprecated": false }, { "signature_type": "Function", "id": "CVE-2025-38489-13a16cda", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c7b20f7785cfdd59403333612c90b458b12307c", "signature_version": "v1", "target": { "function": "bpf_jit_plt", "file": "arch/s390/net/bpf_jit_comp.c" }, "digest": { "function_hash": "221477597312466563834240456894000525244", "length": 179.0 }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2025-38489-2146dac8", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c7b20f7785cfdd59403333612c90b458b12307c", "signature_version": "v1", "target": { "file": "arch/s390/net/bpf_jit_comp.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "14765761207692493740380455598452504070", "14570277078020964419011306589624683629", "268289784513886619169051755418703473422", "321418548681440662064040738463436003800" ] }, "deprecated": false }, { "signature_type": "Function", "id": "CVE-2025-38489-4aa4ae43", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a4f9c7846b1ac428921ce9676b1b8c80ed60093c", "signature_version": "v1", "target": { "function": "bpf_jit_plt", "file": "arch/s390/net/bpf_jit_comp.c" }, "digest": { "function_hash": "221477597312466563834240456894000525244", "length": 179.0 }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2025-38489-62cecf7b", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a4f9c7846b1ac428921ce9676b1b8c80ed60093c", "signature_version": "v1", "target": { "file": "arch/s390/net/bpf_jit_comp.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "14765761207692493740380455598452504070", "14570277078020964419011306589624683629", "268289784513886619169051755418703473422", "321418548681440662064040738463436003800" ] }, "deprecated": false }, { "signature_type": "Function", "id": "CVE-2025-38489-788da868", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5629d1af0600f8cc7c9245e8d832a66358ef889", "signature_version": "v1", "target": { "function": "bpf_jit_plt", "file": "arch/s390/net/bpf_jit_comp.c" }, "digest": { "function_hash": "221477597312466563834240456894000525244", "length": 179.0 }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2025-38489-95ac6c05", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5629d1af0600f8cc7c9245e8d832a66358ef889", "signature_version": "v1", "target": { "file": "arch/s390/net/bpf_jit_comp.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "14765761207692493740380455598452504070", "14570277078020964419011306589624683629", "268289784513886619169051755418703473422", "321418548681440662064040738463436003800" ] }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2025-38489-c8eaf498", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a5abf8cf182f577c7ae6c62f14debc9754ec986", "signature_version": "v1", "target": { "file": "arch/s390/net/bpf_jit_comp.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "14765761207692493740380455598452504070", "14570277078020964419011306589624683629", "268289784513886619169051755418703473422", "321418548681440662064040738463436003800" ] }, "deprecated": false } ]