๐Ÿ” CVE Alert

CVE-2025-37883

UNKNOWN 0.0

s390/sclp: Add check for get_zeroed_page()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Add check for get_zeroed_page() Add check for the return value of get_zeroed_page() in sclp_console_init() to prevent null pointer dereference. Furthermore, to solve the memory leak caused by the loop allocation, add a free helper to do the free job.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 9, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 < e1e00dc45648125ef7cb87ebc3b581ac224e7b39 4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 < 397254706eba9d8f99fd237feede7ab3169a7f9a 4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 < 28e5a867aa542e369e211c2baba7044228809a99 4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 < 3b3aa72636a6205933609ec274a8747720c1ee3f 4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 < f69f8a93aacf6e99af7b1cc992d8ca2cc07b96fb 4c8f4794b61e89dd68f96cfc23a9d9b6c25be420 < 3db42c75a921854a99db0a2775814fef97415bac
Linux / Linux
2.6.31

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e1e00dc45648125ef7cb87ebc3b581ac224e7b39 git.kernel.org: https://git.kernel.org/stable/c/397254706eba9d8f99fd237feede7ab3169a7f9a git.kernel.org: https://git.kernel.org/stable/c/28e5a867aa542e369e211c2baba7044228809a99 git.kernel.org: https://git.kernel.org/stable/c/3b3aa72636a6205933609ec274a8747720c1ee3f git.kernel.org: https://git.kernel.org/stable/c/f69f8a93aacf6e99af7b1cc992d8ca2cc07b96fb git.kernel.org: https://git.kernel.org/stable/c/3db42c75a921854a99db0a2775814fef97415bac lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html