CVE-2025-38339
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/07/2025
Last modified:
18/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
powerpc/bpf: fix JIT code size calculation of bpf trampoline<br />
<br />
arch_bpf_trampoline_size() provides JIT size of the BPF trampoline<br />
before the buffer for JIT&#39;ing it is allocated. The total number of<br />
instructions emitted for BPF trampoline JIT code depends on where<br />
the final image is located. So, the size arrived at with the dummy<br />
pass in arch_bpf_trampoline_size() can vary from the actual size<br />
needed in arch_prepare_bpf_trampoline(). When the instructions<br />
accounted in arch_bpf_trampoline_size() is less than the number of<br />
instructions emitted during the actual JIT compile of the trampoline,<br />
the below warning is produced:<br />
<br />
WARNING: CPU: 8 PID: 204190 at arch/powerpc/net/bpf_jit_comp.c:981 __arch_prepare_bpf_trampoline.isra.0+0xd2c/0xdcc<br />
<br />
which is:<br />
<br />
/* Make sure the trampoline generation logic doesn&#39;t overflow */<br />
if (image && WARN_ON_ONCE(&image[ctx->idx] ><br />
(u32 *)rw_image_end - BPF_INSN_SAFETY)) {<br />
<br />
So, during the dummy pass, instead of providing some arbitrary image<br />
location, account for maximum possible instructions if and when there<br />
is a dependency with image location for JIT&#39;ing.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



