CVE-2025-38428

7.8 HIGH

📋 TL;DR

This CVE describes a memory corruption vulnerability in the Linux kernel's IMS-PCU driver where improper validation of firmware-supplied length values could lead to buffer overflow. Attackers could potentially execute arbitrary code or cause system crashes by providing malicious firmware. Systems using the affected IMS-PCU driver are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with IMS-PCU driver
Versions: Linux kernel versions before the fix commits (specific versions depend on distribution backports)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only systems with IMS-PCU hardware connected and driver loaded are vulnerable. The driver is not loaded by default unless IMS-PCU hardware is present.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Kernel panic or system crash causing denial of service, potentially requiring physical intervention to restore functionality.

🟢

If Mitigated

System remains stable with proper input validation preventing memory corruption.

🌐 Internet-Facing: LOW - This requires physical or local access to the IMS-PCU device interface, not typically exposed to internet.
🏢 Internal Only: MEDIUM - Requires access to the IMS-PCU device interface, which could be exploited by malicious insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to provide malicious firmware to the IMS-PCU device, which typically requires physical or privileged access to the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing commits: 17474a56acf708bf6b2d174c06ed26abad0a9fd6, 5a8cd6ae8393e2eaebf51d420d5374821ef2af87, 74661516daee1eadebede8dc607b6830530096ec, 8e03f1c7d50343bf21da54873301bc4fa647479f, a95ef0199e80f3384eb992889322957d26c00102

Vendor Advisory: https://git.kernel.org/stable/c/17474a56acf708bf6b2d174c06ed26abad0a9fd6

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable IMS-PCU driver

linux

Prevent loading of vulnerable driver if IMS-PCU hardware is not required

echo 'blacklist ims_pcu' >> /etc/modprobe.d/blacklist-ims-pcu.conf
rmmod ims_pcu

🧯 If You Can't Patch

  • Restrict physical access to IMS-PCU device interfaces
  • Implement strict firmware update controls and validation procedures

🔍 How to Verify

Check if Vulnerable:

Check if IMS-PCU driver is loaded: lsmod | grep ims_pcu. If loaded, check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and IMS-PCU driver still functions properly with legitimate firmware.

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crash/panic logs
  • Unexpected firmware update attempts to IMS-PCU

Network Indicators:

  • None - this is a local hardware interface vulnerability

SIEM Query:

source="kernel" AND ("oops" OR "panic") AND "ims_pcu"

🔗 References

📤 Share & Export