Home

Description

In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Add check for get_zeroed_page() Add check for the return value of get_zeroed_page() in sclp_console_init() to prevent null pointer dereference. Furthermore, to solve the memory leak caused by the loop allocation, add a free helper to do the free job.

PUBLISHED Reserved 2025-04-16 | Published 2025-05-09 | Updated 2026-01-02 | Assigner Linux

Product status

Default status
unaffected

4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 (git) before e1e00dc45648125ef7cb87ebc3b581ac224e7b39
affected

4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 (git) before 397254706eba9d8f99fd237feede7ab3169a7f9a
affected

4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 (git) before 28e5a867aa542e369e211c2baba7044228809a99
affected

4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 (git) before 3b3aa72636a6205933609ec274a8747720c1ee3f
affected

4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 (git) before f69f8a93aacf6e99af7b1cc992d8ca2cc07b96fb
affected

4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 (git) before 3db42c75a921854a99db0a2775814fef97415bac
affected

Default status
affected

2.6.31
affected

Any version before 2.6.31
unaffected

5.15.181 (semver)
unaffected

6.1.136 (semver)
unaffected

6.6.89 (semver)
unaffected

6.12.26 (semver)
unaffected

6.14.5 (semver)
unaffected

6.15 (original_commit_for_fix)
unaffected

References

lists.debian.org/debian-lts-announce/2025/05/msg00045.html

git.kernel.org/...c/e1e00dc45648125ef7cb87ebc3b581ac224e7b39

git.kernel.org/...c/397254706eba9d8f99fd237feede7ab3169a7f9a

git.kernel.org/...c/28e5a867aa542e369e211c2baba7044228809a99

git.kernel.org/...c/3b3aa72636a6205933609ec274a8747720c1ee3f

git.kernel.org/...c/f69f8a93aacf6e99af7b1cc992d8ca2cc07b96fb

git.kernel.org/...c/3db42c75a921854a99db0a2775814fef97415bac

cve.org (CVE-2025-37883)

nvd.nist.gov (CVE-2025-37883)

Download JSON