In the Linux kernel, the following vulnerability has been resolved:
s390/sclp: Add check for get_zeroed_page()
Add check for the return value of get_zeroed_page() in
sclp_console_init() to prevent null pointer dereference.
Furthermore, to solve the memory leak caused by the loop
allocation, add a free helper to do the free job.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Sat, 10 May 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 09 May 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Add check for get_zeroed_page() Add check for the return value of get_zeroed_page() in sclp_console_init() to prevent null pointer dereference. Furthermore, to solve the memory leak caused by the loop allocation, add a free helper to do the free job. | |
Title | s390/sclp: Add check for get_zeroed_page() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-26T05:22:58.995Z
Reserved: 2025-04-16T04:51:23.962Z
Link: CVE-2025-37883

No data.

Status : Awaiting Analysis
Published: 2025-05-09T07:16:09.607
Modified: 2025-05-12T17:32:32.760
Link: CVE-2025-37883


No data.