CVE-2025-38733
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.11 |
| linux | linux_kernel | 6.11 |
| linux | linux_kernel | 6.11 |
| linux | linux_kernel | 6.11 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the s390 architecture's memory management where the lowcore region is incorrectly mapped with identity mapping at address zero. Because identity mapping is pinned to address zero, the lowcore is always mapped there, and if the relocate_lowcore option is used, the lowcore ends up being mapped twice. This causes NULL pointer accesses to succeed instead of causing exceptions, potentially allowing unintended memory access.
How can this vulnerability impact me? :
The vulnerability allows NULL pointer dereferences to succeed rather than causing exceptions, which can lead to unintended memory access or corruption. This could be exploited to bypass certain protections or cause system instability on affected Linux systems using the s390 architecture.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by not mapping the first two pages of physical memory with identity mapping. There are no specific configuration changes or commands provided to mitigate this vulnerability other than applying the kernel update.