Skip to main content

CVE-2025-37830: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-37830cvecve-2025-37830
Published: Thu May 08 2025 (05/08/2025, 06:26:21 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() cpufreq_cpu_get_raw() can return NULL when the target CPU is not present in the policy->cpus mask. scmi_cpufreq_get_rate() does not check for this case, which results in a NULL pointer dereference. Add NULL check after cpufreq_cpu_get_raw() to prevent this issue.

AI-Powered Analysis

AILast updated: 07/04/2025, 00:11:24 UTC

Technical Analysis

CVE-2025-37830 is a vulnerability identified in the Linux kernel's CPU frequency scaling subsystem, specifically within the SCMI (System Control and Management Interface) cpufreq driver. The issue arises in the function scmi_cpufreq_get_rate(), which calls cpufreq_cpu_get_raw() to retrieve CPU frequency data. However, cpufreq_cpu_get_raw() can return a NULL pointer if the target CPU is not present in the policy->cpus mask, a condition that scmi_cpufreq_get_rate() does not currently check for. This lack of validation leads to a NULL pointer dereference when the returned pointer is used without verification. Such a dereference typically results in a kernel panic or system crash, causing a denial of service (DoS) condition. The vulnerability was addressed by adding a NULL check after the cpufreq_cpu_get_raw() call to prevent dereferencing a NULL pointer. The affected versions are identified by specific commit hashes, indicating that this vulnerability is present in certain recent Linux kernel builds prior to the fix. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability does not appear to require user interaction or authentication, as it is within kernel code that manages CPU frequency policies, which may be invoked by system components or privileged processes.

Potential Impact

For European organizations, the primary impact of CVE-2025-37830 is the potential for denial of service through system crashes caused by kernel NULL pointer dereferences. Systems running vulnerable Linux kernel versions could experience unexpected reboots or downtime, which can disrupt critical services, especially in environments relying heavily on Linux servers such as data centers, cloud infrastructure, and embedded systems. While this vulnerability does not directly lead to privilege escalation or data leakage, the availability impact can be significant, particularly for organizations with high uptime requirements like financial institutions, healthcare providers, and telecommunications companies. Additionally, embedded Linux devices used in industrial control systems or IoT deployments across Europe could be affected, potentially impacting operational technology environments. Since no exploits are known in the wild, the immediate risk is moderate, but the vulnerability should be addressed promptly to avoid future exploitation, especially as attackers may develop exploits once the vulnerability details become widely known.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the fixed version that includes the NULL pointer check in scmi_cpufreq_get_rate(). Specifically, they should track kernel updates from their Linux distribution vendors and apply patches as soon as they are available. For environments where immediate patching is not feasible, organizations can mitigate risk by limiting access to systems running vulnerable kernels, restricting unprivileged users from invoking CPU frequency scaling interfaces, and monitoring system logs for kernel panics or crashes related to cpufreq. Additionally, organizations should implement robust system monitoring and automated reboot procedures to minimize downtime if crashes occur. For embedded or specialized Linux devices, coordination with device vendors to obtain patched firmware or kernel updates is essential. Finally, maintaining a comprehensive inventory of Linux kernel versions in use across the organization will help prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.951Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd88a2

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/4/2025, 12:11:24 AM

Last updated: 7/29/2025, 6:31:14 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats