CVE-2025-38113
ACPI: CPPC: Fix NULL pointer dereference when nosmp is used
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Fix NULL pointer dereference when nosmp is used With nosmp in cmdline, other CPUs are not brought up, leaving their cpc_desc_ptr NULL. CPU0's iteration via for_each_possible_cpu() dereferences these NULL pointers, causing panic. Panic backtrace: [ 0.401123] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000b8 ... [ 0.403255] [<ffffffff809a5818>] cppc_allow_fast_switch+0x6a/0xd4 ... Kernel panic - not syncing: Attempted to kill init! [ rjw: New subject ]
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jul 3, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
3cc30dd00a580ca0c9c0b01639841cfd72d10129 < 356d09c7f5bf525086002a34f8bae40b134d1611 3cc30dd00a580ca0c9c0b01639841cfd72d10129 < c6dad167aade4bf0bef9130f2f149f4249fc4ad0 3cc30dd00a580ca0c9c0b01639841cfd72d10129 < 32a48db4cf28ea087214c261da8476db218d08bd 3cc30dd00a580ca0c9c0b01639841cfd72d10129 < 1a677d0ceb4a5d62117b711a8b2e0aee80d33015 3cc30dd00a580ca0c9c0b01639841cfd72d10129 < 15eece6c5b05e5f9db0711978c3e3b7f1a2cfe12
Linux / Linux
5.19
References
git.kernel.org: https://git.kernel.org/stable/c/356d09c7f5bf525086002a34f8bae40b134d1611 git.kernel.org: https://git.kernel.org/stable/c/c6dad167aade4bf0bef9130f2f149f4249fc4ad0 git.kernel.org: https://git.kernel.org/stable/c/32a48db4cf28ea087214c261da8476db218d08bd git.kernel.org: https://git.kernel.org/stable/c/1a677d0ceb4a5d62117b711a8b2e0aee80d33015 git.kernel.org: https://git.kernel.org/stable/c/15eece6c5b05e5f9db0711978c3e3b7f1a2cfe12 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html