CVE-2025-39694

In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Fix SCCB present check Tracing code called by the SCLP interrupt handler contains early exits if the SCCB address associated with an interrupt is NULL. This check is performed after physical to virtual address translation. If the kernel identity mapping does not start at address zero, the resulting virtual address is never zero, so that the NULL checks won't work. Subsequently this may result in incorrect accesses to the first page of the identity mapping. Fix this by introducing a function that handles the NULL case before address translation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 20:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/430fa71027b6ac9bb0ce5532b8d0676777d4219a - () https://git.kernel.org/stable/c/430fa71027b6ac9bb0ce5532b8d0676777d4219a - Patch
References () https://git.kernel.org/stable/c/61605c847599fbfdfafe638607841c7d73719081 - () https://git.kernel.org/stable/c/61605c847599fbfdfafe638607841c7d73719081 - Patch
References () https://git.kernel.org/stable/c/86c2825791c3836a8f77a954b9c5ebe6fab410c5 - () https://git.kernel.org/stable/c/86c2825791c3836a8f77a954b9c5ebe6fab410c5 - Patch
References () https://git.kernel.org/stable/c/aa5073ac1a2a274812f3b04c278992e68ff67cc7 - () https://git.kernel.org/stable/c/aa5073ac1a2a274812f3b04c278992e68ff67cc7 - Patch
References () https://git.kernel.org/stable/c/bf83ae3537359af088d6577812ed93113dfbcb7b - () https://git.kernel.org/stable/c/bf83ae3537359af088d6577812ed93113dfbcb7b - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

05 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-05 18:15

Updated : 2026-01-07 20:32


NVD link : CVE-2025-39694

Mitre link : CVE-2025-39694

CVE.ORG link : CVE-2025-39694


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference