CVE-2025-37829
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's SCPI cpufreq driver allows local attackers to crash the system by triggering a kernel panic. This affects Linux systems using the SCPI cpufreq driver, particularly ARM-based systems with specific CPU frequency scaling implementations.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local denial of service causing kernel panic and system crash, potentially leading to data loss or service disruption.
Likely Case
Local denial of service through system crash when malicious users trigger the vulnerable code path.
If Mitigated
Minimal impact with proper access controls preventing local users from executing the vulnerable code path.
🎯 Exploit Status
Requires local access and ability to trigger the specific cpufreq operation. Exploitation requires understanding of system's CPU configuration.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in stable kernel branches (commits: 124bddf123311cd1f18bffd63a5d974468d59c67, 19e0eaa62e8831f2bc0285fef3bf8faaa7f3e09b, 28fbd7b13b4d3074b16db913aedc9d8d37ab41e7, 73b24dc731731edf762f9454552cb3a5b7224949, 8fbaa76690f67a7cbad315f89d607b46e3e06ede)
Vendor Advisory: https://git.kernel.org/stable/c/124bddf123311cd1f18bffd63a5d974468d59c67
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Reboot system. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable SCPI cpufreq driver
linuxRemove or blacklist the scpi-cpufreq module to prevent loading of vulnerable driver
echo 'blacklist scpi-cpufreq' >> /etc/modprobe.d/blacklist-scpi.conf
rmmod scpi-cpufreq
🧯 If You Can't Patch
- Restrict local user access to prevent exploitation
- Implement strict process isolation and privilege separation
🔍 How to Verify
Check if Vulnerable:
Check if scpi-cpufreq module is loaded: lsmod | grep scpi_cpufreq
Check Version:
uname -r
Verify Fix Applied:
Check kernel version against patched versions and verify scpi-cpufreq module loads without errors
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- NULL pointer dereference errors in kernel logs
- System crash/reboot events
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("NULL pointer dereference" OR "scpi_cpufreq" OR "kernel panic")
🔗 References
- https://git.kernel.org/stable/c/124bddf123311cd1f18bffd63a5d974468d59c67
- https://git.kernel.org/stable/c/19e0eaa62e8831f2bc0285fef3bf8faaa7f3e09b
- https://git.kernel.org/stable/c/28fbd7b13b4d3074b16db913aedc9d8d37ab41e7
- https://git.kernel.org/stable/c/73b24dc731731edf762f9454552cb3a5b7224949
- https://git.kernel.org/stable/c/8fbaa76690f67a7cbad315f89d607b46e3e06ede
- https://git.kernel.org/stable/c/ad4796f2da495b2cbbd0fccccbcbf63f2aeee613
- https://git.kernel.org/stable/c/da8ee91e532486055ecf88478d38c2f3dc234182
- https://git.kernel.org/stable/c/fdf035d9c5436536ffcfea0ac6adeb5dda3c3a23
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html