In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Add check for get_zeroed_page() Add check for the return value of get_zeroed_page() in sclp_console_init() to prevent null pointer dereference. Furthermore, to solve the memory leak caused by the loop allocation, add a free helper to do the free job.
2025-05-09T07:16:09.607
2025-11-12T19:29:18.717
Analyzed
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSSv3.1: 5.5 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | linux | linux_kernel | < 5.15.181 | Yes |
| Operating System | linux | linux_kernel | < 6.1.136 | Yes |
| Operating System | linux | linux_kernel | < 6.6.89 | Yes |
| Operating System | linux | linux_kernel | < 6.12.26 | Yes |
| Operating System | linux | linux_kernel | < 6.14.5 | Yes |
| Operating System | debian | debian_linux | 11.0 | Yes |