CVE-2025-38368

5.5 MEDIUM

📋 TL;DR

This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's tps6594-pfsm driver. If exploited, it could cause a kernel panic or system crash on systems using this driver. The vulnerability affects Linux systems with the tps6594-pfsm driver loaded.

💻 Affected Systems

Products:
  • Linux kernel with tps6594-pfsm driver
Versions: Linux kernel versions before the fix commits (specific versions depend on distribution backports)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the tps6594-pfsm driver is loaded (typically for TI TPS6594 power management chips)

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical reboot.

🟠

Likely Case

System crash or kernel panic when the driver is loaded and the specific code path is triggered.

🟢

If Mitigated

No impact if the driver is not loaded or the vulnerable code path is not executed.

🌐 Internet-Facing: LOW - This is a local kernel driver vulnerability requiring local access.
🏢 Internal Only: MEDIUM - Could be exploited by local users or through other vulnerabilities to cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to trigger the vulnerable code path. Found by static analysis tool, not known to be exploited in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits a10c8bff454b, a8d1b4f219e8, a99b598d836c, or d27ee5c59881

Vendor Advisory: https://git.kernel.org/stable/c/a10c8bff454b11ef553d9df19ee722d2df34cd0e

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load patched kernel. 3. Verify driver functionality if using TPS6594 hardware.

🔧 Temporary Workarounds

Unload tps6594-pfsm driver

linux

Remove the vulnerable driver module if not needed

sudo rmmod tps6594-pfsm

Blacklist driver module

linux

Prevent driver from loading at boot

echo 'blacklist tps6594-pfsm' | sudo tee /etc/modprobe.d/blacklist-tps6594-pfsm.conf
sudo update-initramfs -u

🧯 If You Can't Patch

  • Ensure the tps6594-pfsm driver is not loaded if not required for hardware
  • Restrict local user access to systems with vulnerable driver loaded

🔍 How to Verify

Check if Vulnerable:

Check if tps6594-pfsm driver is loaded: lsmod | grep tps6594-pfsm

Check Version:

uname -r

Verify Fix Applied:

Check kernel version contains fix commits or verify driver loads without issues

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • NULL pointer dereference errors in kernel logs
  • System crash/reboot events

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("NULL pointer" OR "kernel panic" OR "Oops") AND "tps6594"

🔗 References

📤 Share & Export