[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025072559-CVE-2025-38368-e561@gregkh>
Date: Fri, 25 Jul 2025 14:48:09 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-38368: misc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe()
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
misc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe()
The returned value, pfsm->miscdev.name, from devm_kasprintf()
could be NULL.
A pointer check is added to prevent potential NULL pointer dereference.
This is similar to the fix in commit 3027e7b15b02
("ice: Fix some null pointer dereference issues in ice_ptp.c").
This issue is found by our static analysis tool.
The Linux kernel CVE team has assigned CVE-2025-38368 to this issue.
Affected and fixed versions
===========================
Fixed in 6.6.96 with commit a8d1b4f219e8833130927f19d1c8bfbf49215ce4
Fixed in 6.12.36 with commit a10c8bff454b11ef553d9df19ee722d2df34cd0e
Fixed in 6.15.5 with commit d27ee5c59881a64ea92e363502742cb4f38b7460
Fixed in 6.16-rc1 with commit a99b598d836c9c6411110c70a2da134c78d96e67
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-38368
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/misc/tps6594-pfsm.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/a8d1b4f219e8833130927f19d1c8bfbf49215ce4
https://git.kernel.org/stable/c/a10c8bff454b11ef553d9df19ee722d2df34cd0e
https://git.kernel.org/stable/c/d27ee5c59881a64ea92e363502742cb4f38b7460
https://git.kernel.org/stable/c/a99b598d836c9c6411110c70a2da134c78d96e67
Powered by blists - more mailing lists