
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel was discovered related to a NULL pointer dereference in the AVX-512 status functionality. The issue was identified and disclosed on September 4, 2025, affecting systems with CONFIG_X86_DEBUG_FPU enabled (NVD).
The vulnerability occurs when reading /proc/[kthread]/arch_status with CONFIG_X86_DEBUG_FPU enabled. The issue stems from the AVX-512 timestamp code using x86_task_fpu() without proper NULL checking. When CONFIG_X86_DEBUG_FPU is enabled, the function returns NULL for kernel threads (PF_KTHREAD specifically), leading to a NULL pointer dereference and warning (NVD).
The vulnerability can cause system warnings and NULL pointer dereferences when attempting to read architectural status information for kernel threads. While all kernel tasks exposed in /proc have a valid task->fpu, the impact is limited to debugging scenarios where CONFIG_X86_DEBUG_FPU is enabled (NVD).
The solution involves stopping the output of AVX-512_elapsed_ms for kernel threads entirely, rather than implementing NULL checks. This approach was chosen because the AVX-512 timestamp data was only relevant for user threads, not kernel threads. The fix preserves the warning system that prevents misuse of FPU state in kernel threads (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."