{"id":"CVE-2025-38113","summary":"ACPI: CPPC: Fix NULL pointer dereference when nosmp is used","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: CPPC: Fix NULL pointer dereference when nosmp is used\n\nWith nosmp in cmdline, other CPUs are not brought up, leaving\ntheir cpc_desc_ptr NULL. CPU0's iteration via for_each_possible_cpu()\ndereferences these NULL pointers, causing panic.\n\nPanic backtrace:\n\n[    0.401123] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000b8\n...\n[    0.403255] [\u003cffffffff809a5818\u003e] cppc_allow_fast_switch+0x6a/0xd4\n...\nKernel panic - not syncing: Attempted to kill init!\n\n[ rjw: New subject ]","modified":"2026-04-16T04:37:04.325229574Z","published":"2025-07-03T08:35:22.207Z","related":["SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38113.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/15eece6c5b05e5f9db0711978c3e3b7f1a2cfe12"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1a677d0ceb4a5d62117b711a8b2e0aee80d33015"},{"type":"WEB","url":"https://git.kernel.org/stable/c/32a48db4cf28ea087214c261da8476db218d08bd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/356d09c7f5bf525086002a34f8bae40b134d1611"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c6dad167aade4bf0bef9130f2f149f4249fc4ad0"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38113.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38113"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3cc30dd00a580ca0c9c0b01639841cfd72d10129"},{"fixed":"356d09c7f5bf525086002a34f8bae40b134d1611"},{"fixed":"c6dad167aade4bf0bef9130f2f149f4249fc4ad0"},{"fixed":"32a48db4cf28ea087214c261da8476db218d08bd"},{"fixed":"1a677d0ceb4a5d62117b711a8b2e0aee80d33015"},{"fixed":"15eece6c5b05e5f9db0711978c3e3b7f1a2cfe12"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38113.json"}}],"schema_version":"1.7.5"}