CVE-2025-37883

In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Add check for get_zeroed_page() Add check for the return value of get_zeroed_page() in sclp_console_init() to prevent null pointer dereference. Furthermore, to solve the memory leak caused by the loop allocation, add a free helper to do the free job.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

12 Nov 2025, 19:29

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
References () https://git.kernel.org/stable/c/28e5a867aa542e369e211c2baba7044228809a99 - () https://git.kernel.org/stable/c/28e5a867aa542e369e211c2baba7044228809a99 - Patch
References () https://git.kernel.org/stable/c/397254706eba9d8f99fd237feede7ab3169a7f9a - () https://git.kernel.org/stable/c/397254706eba9d8f99fd237feede7ab3169a7f9a - Patch
References () https://git.kernel.org/stable/c/3b3aa72636a6205933609ec274a8747720c1ee3f - () https://git.kernel.org/stable/c/3b3aa72636a6205933609ec274a8747720c1ee3f - Patch
References () https://git.kernel.org/stable/c/3db42c75a921854a99db0a2775814fef97415bac - () https://git.kernel.org/stable/c/3db42c75a921854a99db0a2775814fef97415bac - Patch
References () https://git.kernel.org/stable/c/e1e00dc45648125ef7cb87ebc3b581ac224e7b39 - () https://git.kernel.org/stable/c/e1e00dc45648125ef7cb87ebc3b581ac224e7b39 - Patch
References () https://git.kernel.org/stable/c/f69f8a93aacf6e99af7b1cc992d8ca2cc07b96fb - () https://git.kernel.org/stable/c/f69f8a93aacf6e99af7b1cc992d8ca2cc07b96fb - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

12 May 2025, 17:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: s390/sclp: Se ha añadido una comprobación para get_zeroed_page(). Se ha añadido una comprobación del valor de retorno de get_zeroed_page() en sclp_console_init() para evitar la desreferencia de punteros nulos. Además, para solucionar la fuga de memoria causada por la asignación de bucles, se ha añadido un asistente gratuito para realizar la tarea.

09 May 2025, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-09 07:16

Updated : 2025-11-12 19:29


NVD link : CVE-2025-37883

Mitre link : CVE-2025-37883

CVE.ORG link : CVE-2025-37883


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference