Home

Description

In the Linux kernel, the following vulnerability has been resolved: powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() The get_pd_power_uw() function can crash with a NULL pointer dereference when em_cpu_get() returns NULL. This occurs when a CPU becomes impossible during runtime, causing get_cpu_device() to return NULL, which propagates through em_cpu_get() and leads to a crash when em_span_cpus() dereferences the NULL pointer. Add a NULL check after em_cpu_get() and return 0 if unavailable, matching the existing fallback behavior in __dtpm_cpu_setup(). [ rjw: Drop an excess empty code line ]

PUBLISHED Reserved 2025-04-16 | Published 2025-08-19 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

eb82bace893169b319c563b7f813c58a0a5a9f76 before 27914f2b795e2b58e9506f281dcdd98fef09d3c2
affected

eb82bace893169b319c563b7f813c58a0a5a9f76 before c6ec27091cf5ac05094c1fe3a6ce914cf711a37c
affected

eb82bace893169b319c563b7f813c58a0a5a9f76 before 8374ac7d69a57d737e701a851ffe980a0d27d3ad
affected

eb82bace893169b319c563b7f813c58a0a5a9f76 before 27e0318f0ea69fcfa32228847debc384ade14578
affected

eb82bace893169b319c563b7f813c58a0a5a9f76 before 2fd001a0075ac01dc64a28a8e21226b3d989a91d
affected

eb82bace893169b319c563b7f813c58a0a5a9f76 before 46dc57406887dd02565cb264224194a6776d882b
affected

Default status
affected

5.16
affected

Any version before 5.16
unaffected

6.1.148
unaffected

6.6.102
unaffected

6.12.42
unaffected

6.15.10
unaffected

6.16.1
unaffected

6.17
unaffected

References

git.kernel.org/...c/27914f2b795e2b58e9506f281dcdd98fef09d3c2

git.kernel.org/...c/c6ec27091cf5ac05094c1fe3a6ce914cf711a37c

git.kernel.org/...c/8374ac7d69a57d737e701a851ffe980a0d27d3ad

git.kernel.org/...c/27e0318f0ea69fcfa32228847debc384ade14578

git.kernel.org/...c/2fd001a0075ac01dc64a28a8e21226b3d989a91d

git.kernel.org/...c/46dc57406887dd02565cb264224194a6776d882b

cve.org (CVE-2025-38610)

nvd.nist.gov (CVE-2025-38610)

Download JSON