CVE-2025-38428
📋 TL;DR
This CVE describes a memory corruption vulnerability in the Linux kernel's IMS-PCU driver where improper validation of firmware-supplied length values could lead to buffer overflow. Attackers could potentially execute arbitrary code or cause system crashes by providing malicious firmware. Systems using the affected IMS-PCU driver are vulnerable.
💻 Affected Systems
- Linux kernel with IMS-PCU driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete system compromise, data theft, or persistent backdoor installation.
Likely Case
Kernel panic or system crash causing denial of service, potentially requiring physical intervention to restore functionality.
If Mitigated
System remains stable with proper input validation preventing memory corruption.
🎯 Exploit Status
Exploitation requires ability to provide malicious firmware to the IMS-PCU device, which typically requires physical or privileged access to the system.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel versions containing commits: 17474a56acf708bf6b2d174c06ed26abad0a9fd6, 5a8cd6ae8393e2eaebf51d420d5374821ef2af87, 74661516daee1eadebede8dc607b6830530096ec, 8e03f1c7d50343bf21da54873301bc4fa647479f, a95ef0199e80f3384eb992889322957d26c00102
Vendor Advisory: https://git.kernel.org/stable/c/17474a56acf708bf6b2d174c06ed26abad0a9fd6
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable IMS-PCU driver
linuxPrevent loading of vulnerable driver if IMS-PCU hardware is not required
echo 'blacklist ims_pcu' >> /etc/modprobe.d/blacklist-ims-pcu.conf
rmmod ims_pcu
🧯 If You Can't Patch
- Restrict physical access to IMS-PCU device interfaces
- Implement strict firmware update controls and validation procedures
🔍 How to Verify
Check if Vulnerable:
Check if IMS-PCU driver is loaded: lsmod | grep ims_pcu. If loaded, check kernel version against patched versions.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and IMS-PCU driver still functions properly with legitimate firmware.
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- System crash/panic logs
- Unexpected firmware update attempts to IMS-PCU
Network Indicators:
- None - this is a local hardware interface vulnerability
SIEM Query:
source="kernel" AND ("oops" OR "panic") AND "ims_pcu"
🔗 References
- https://git.kernel.org/stable/c/17474a56acf708bf6b2d174c06ed26abad0a9fd6
- https://git.kernel.org/stable/c/5a8cd6ae8393e2eaebf51d420d5374821ef2af87
- https://git.kernel.org/stable/c/74661516daee1eadebede8dc607b6830530096ec
- https://git.kernel.org/stable/c/8e03f1c7d50343bf21da54873301bc4fa647479f
- https://git.kernel.org/stable/c/a95ef0199e80f3384eb992889322957d26c00102
- https://git.kernel.org/stable/c/c1b9d140b0807c6aee4bb53e1bfa4e391e3dc204
- https://git.kernel.org/stable/c/d63706d9f73846106fde28b284f08e01b92ce9f1
- https://git.kernel.org/stable/c/e5a2481dc2a0b430f49276d7482793a8923631d6
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html