CVE-2025-38610
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's powercap subsystem allows local attackers to crash the kernel when a CPU becomes unavailable during runtime. This affects systems running vulnerable Linux kernel versions with power management features enabled. The vulnerability requires local access to trigger.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.
Likely Case
System crash or kernel panic when specific power management operations occur on systems with CPU hot-unplug events.
If Mitigated
Minor performance impact from power management operations failing gracefully instead of crashing.
🎯 Exploit Status
Requires local access and ability to trigger CPU hot-unplug events or power management operations.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in stable kernel trees (commits listed in references)
Vendor Advisory: https://git.kernel.org/stable/c/27914f2b795e2b58e9506f281dcdd98fef09d3c2
Restart Required: No
Instructions:
1. Update to a patched kernel version from your distribution's repositories. 2. Apply the specific kernel patch if building from source. 3. Reboot to load the new kernel.
🔧 Temporary Workarounds
Disable CPU hot-unplug
allPrevent CPUs from being removed during runtime to avoid triggering the vulnerability
echo 0 > /sys/devices/system/cpu/cpuX/online (for specific CPUs)
Set kernel boot parameter 'maxcpus' to fixed value
Disable powercap subsystem
allRemove the vulnerable component if not needed
modprobe -r powercap
Add 'powercap.blacklist=1' to kernel parameters
🧯 If You Can't Patch
- Restrict local user access to systems with vulnerable kernels
- Monitor for kernel panic events and implement high availability solutions
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if powercap subsystem is loaded: lsmod | grep powercap && uname -r
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and check for presence of the fix in kernel source or changelog
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- NULL pointer dereference errors in kernel logs
- CPU hot-unplug events followed by crashes
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("NULL pointer dereference" OR "kernel panic") AND process="get_pd_power_uw"
🔗 References
- https://git.kernel.org/stable/c/27914f2b795e2b58e9506f281dcdd98fef09d3c2
- https://git.kernel.org/stable/c/27e0318f0ea69fcfa32228847debc384ade14578
- https://git.kernel.org/stable/c/2fd001a0075ac01dc64a28a8e21226b3d989a91d
- https://git.kernel.org/stable/c/46dc57406887dd02565cb264224194a6776d882b
- https://git.kernel.org/stable/c/8374ac7d69a57d737e701a851ffe980a0d27d3ad
- https://git.kernel.org/stable/c/c6ec27091cf5ac05094c1fe3a6ce914cf711a37c
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html