In the Linux kernel, the following vulnerability has been resolved:
s390/sclp: Add check for get_zeroed_page()
Add check for the return value of get_zeroed_page() in
sclp_console_init() to prevent null pointer dereference.
Furthermore, to solve the memory leak caused by the loop
allocation, add a free helper to do the free job.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
12 Nov 2025, 19:29
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-476 | |
| References | () https://git.kernel.org/stable/c/28e5a867aa542e369e211c2baba7044228809a99 - Patch | |
| References | () https://git.kernel.org/stable/c/397254706eba9d8f99fd237feede7ab3169a7f9a - Patch | |
| References | () https://git.kernel.org/stable/c/3b3aa72636a6205933609ec274a8747720c1ee3f - Patch | |
| References | () https://git.kernel.org/stable/c/3db42c75a921854a99db0a2775814fef97415bac - Patch | |
| References | () https://git.kernel.org/stable/c/e1e00dc45648125ef7cb87ebc3b581ac224e7b39 - Patch | |
| References | () https://git.kernel.org/stable/c/f69f8a93aacf6e99af7b1cc992d8ca2cc07b96fb - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
| First Time |
Debian debian Linux
Linux Debian Linux linux Kernel |
03 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
12 May 2025, 17:32
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
09 May 2025, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-09 07:16
Updated : 2025-11-12 19:29
NVD link : CVE-2025-37883
Mitre link : CVE-2025-37883
CVE.ORG link : CVE-2025-37883
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
