In the Linux kernel, the following vulnerability has been resolved:
s390/bpf: Fix bpfarchtextpoke() with newaddr == NULL again
Commit 7ded842b356d ("s390/bpf: Fix bpfplt pointer arithmetic") has accidentally removed the critical piece of commit c730fce7c70c ("s390/bpf: Fix bpfarchtextpoke() with newaddr == NULL"), causing intermittent kernel panics in e.g. perf's onswitch() prog to reappear.
Restore the fix and add a comment.
[
{
"id": "CVE-2025-38489-131c6cfe",
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "arch/s390/net/bpf_jit_comp.c",
"function": "bpf_jit_plt"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a5abf8cf182f577c7ae6c62f14debc9754ec986",
"digest": {
"length": 179.0,
"function_hash": "221477597312466563834240456894000525244"
},
"deprecated": false
},
{
"id": "CVE-2025-38489-13a16cda",
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "arch/s390/net/bpf_jit_comp.c",
"function": "bpf_jit_plt"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c7b20f7785cfdd59403333612c90b458b12307c",
"digest": {
"length": 179.0,
"function_hash": "221477597312466563834240456894000525244"
},
"deprecated": false
},
{
"id": "CVE-2025-38489-2146dac8",
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "arch/s390/net/bpf_jit_comp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c7b20f7785cfdd59403333612c90b458b12307c",
"digest": {
"line_hashes": [
"14765761207692493740380455598452504070",
"14570277078020964419011306589624683629",
"268289784513886619169051755418703473422",
"321418548681440662064040738463436003800"
],
"threshold": 0.9
},
"deprecated": false
},
{
"id": "CVE-2025-38489-4aa4ae43",
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "arch/s390/net/bpf_jit_comp.c",
"function": "bpf_jit_plt"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a4f9c7846b1ac428921ce9676b1b8c80ed60093c",
"digest": {
"length": 179.0,
"function_hash": "221477597312466563834240456894000525244"
},
"deprecated": false
},
{
"id": "CVE-2025-38489-62cecf7b",
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "arch/s390/net/bpf_jit_comp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a4f9c7846b1ac428921ce9676b1b8c80ed60093c",
"digest": {
"line_hashes": [
"14765761207692493740380455598452504070",
"14570277078020964419011306589624683629",
"268289784513886619169051755418703473422",
"321418548681440662064040738463436003800"
],
"threshold": 0.9
},
"deprecated": false
},
{
"id": "CVE-2025-38489-788da868",
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "arch/s390/net/bpf_jit_comp.c",
"function": "bpf_jit_plt"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5629d1af0600f8cc7c9245e8d832a66358ef889",
"digest": {
"length": 179.0,
"function_hash": "221477597312466563834240456894000525244"
},
"deprecated": false
},
{
"id": "CVE-2025-38489-95ac6c05",
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "arch/s390/net/bpf_jit_comp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5629d1af0600f8cc7c9245e8d832a66358ef889",
"digest": {
"line_hashes": [
"14765761207692493740380455598452504070",
"14570277078020964419011306589624683629",
"268289784513886619169051755418703473422",
"321418548681440662064040738463436003800"
],
"threshold": 0.9
},
"deprecated": false
},
{
"id": "CVE-2025-38489-c8eaf498",
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "arch/s390/net/bpf_jit_comp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a5abf8cf182f577c7ae6c62f14debc9754ec986",
"digest": {
"line_hashes": [
"14765761207692493740380455598452504070",
"14570277078020964419011306589624683629",
"268289784513886619169051755418703473422",
"321418548681440662064040738463436003800"
],
"threshold": 0.9
},
"deprecated": false
}
]