In the Linux kernel, the following vulnerability has been resolved:
s390/mm: Do not map lowcore with identity mapping
Since the identity mapping is pinned to address zero the lowcore is always
also mapped to address zero, this happens regardless of the relocate_lowcore
command line option. If the option is specified the lowcore is mapped
twice, instead of only once.
This means that NULL pointer accesses will succeed instead of causing an
exception (low address protection still applies, but covers only parts).
To fix this never map the first two pages of physical memory with the
identity mapping.
References
Configurations
Configuration 1 (hide)
|
History
25 Nov 2025, 21:59
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-476 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux linux Kernel
Linux |
|
| References | () https://git.kernel.org/stable/c/1d7864acd497cb468a998d44631f84896f885e85 - Patch | |
| References | () https://git.kernel.org/stable/c/30bf5728bb217a6d1ba73f44094c9b9c6bc9a567 - Patch | |
| References | () https://git.kernel.org/stable/c/93f616ff870a1fb7e84d472cad0af651b18f9f87 - Patch |
Information
Published : 2025-09-05 18:15
Updated : 2025-11-25 21:59
NVD link : CVE-2025-38733
Mitre link : CVE-2025-38733
CVE.ORG link : CVE-2025-38733
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
