๐Ÿ” CVE Alert

CVE-2025-38113

UNKNOWN 0.0

ACPI: CPPC: Fix NULL pointer dereference when nosmp is used

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Fix NULL pointer dereference when nosmp is used With nosmp in cmdline, other CPUs are not brought up, leaving their cpc_desc_ptr NULL. CPU0's iteration via for_each_possible_cpu() dereferences these NULL pointers, causing panic. Panic backtrace: [ 0.401123] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000b8 ... [ 0.403255] [<ffffffff809a5818>] cppc_allow_fast_switch+0x6a/0xd4 ... Kernel panic - not syncing: Attempted to kill init! [ rjw: New subject ]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 3, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
3cc30dd00a580ca0c9c0b01639841cfd72d10129 < 356d09c7f5bf525086002a34f8bae40b134d1611 3cc30dd00a580ca0c9c0b01639841cfd72d10129 < c6dad167aade4bf0bef9130f2f149f4249fc4ad0 3cc30dd00a580ca0c9c0b01639841cfd72d10129 < 32a48db4cf28ea087214c261da8476db218d08bd 3cc30dd00a580ca0c9c0b01639841cfd72d10129 < 1a677d0ceb4a5d62117b711a8b2e0aee80d33015 3cc30dd00a580ca0c9c0b01639841cfd72d10129 < 15eece6c5b05e5f9db0711978c3e3b7f1a2cfe12
Linux / Linux
5.19

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/356d09c7f5bf525086002a34f8bae40b134d1611 git.kernel.org: https://git.kernel.org/stable/c/c6dad167aade4bf0bef9130f2f149f4249fc4ad0 git.kernel.org: https://git.kernel.org/stable/c/32a48db4cf28ea087214c261da8476db218d08bd git.kernel.org: https://git.kernel.org/stable/c/1a677d0ceb4a5d62117b711a8b2e0aee80d33015 git.kernel.org: https://git.kernel.org/stable/c/15eece6c5b05e5f9db0711978c3e3b7f1a2cfe12 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html