CVE-2025-38368

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38368
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38368.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38368
Downstream
Related
Published
2025-07-25T12:47:42Z
Modified
2025-10-15T03:44:20.221634Z
Summary
misc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe()
Details

In the Linux kernel, the following vulnerability has been resolved:

misc: tps6594-pfsm: Add NULL pointer check in tps6594pfsmprobe()

The returned value, pfsm->miscdev.name, from devmkasprintf() could be NULL. A pointer check is added to prevent potential NULL pointer dereference. This is similar to the fix in commit 3027e7b15b02 ("ice: Fix some null pointer dereference issues in iceptp.c").

This issue is found by our static analysis tool.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a0df3ef087f8aaebbdf205b1b2e126ec9ef6b113
Fixed
a8d1b4f219e8833130927f19d1c8bfbf49215ce4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a0df3ef087f8aaebbdf205b1b2e126ec9ef6b113
Fixed
a10c8bff454b11ef553d9df19ee722d2df34cd0e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a0df3ef087f8aaebbdf205b1b2e126ec9ef6b113
Fixed
d27ee5c59881a64ea92e363502742cb4f38b7460
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a0df3ef087f8aaebbdf205b1b2e126ec9ef6b113
Fixed
a99b598d836c9c6411110c70a2da134c78d96e67

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.10
v6.12.11
v6.12.12
v6.12.13
v6.12.14
v6.12.15
v6.12.16
v6.12.17
v6.12.18
v6.12.19
v6.12.2
v6.12.20
v6.12.21
v6.12.22
v6.12.23
v6.12.24
v6.12.25
v6.12.26
v6.12.27
v6.12.28
v6.12.29
v6.12.3
v6.12.30
v6.12.31
v6.12.32
v6.12.33
v6.12.34
v6.12.35
v6.12.4
v6.12.5
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.15.1
v6.15.2
v6.15.3
v6.15.4
v6.4
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.31
v6.6.32
v6.6.33
v6.6.34
v6.6.35
v6.6.36
v6.6.37
v6.6.38
v6.6.39
v6.6.4
v6.6.40
v6.6.41
v6.6.42
v6.6.43
v6.6.44
v6.6.45
v6.6.46
v6.6.47
v6.6.48
v6.6.49
v6.6.5
v6.6.50
v6.6.51
v6.6.52
v6.6.53
v6.6.54
v6.6.55
v6.6.56
v6.6.57
v6.6.58
v6.6.59
v6.6.6
v6.6.60
v6.6.61
v6.6.62
v6.6.63
v6.6.64
v6.6.65
v6.6.66
v6.6.67
v6.6.68
v6.6.69
v6.6.7
v6.6.70
v6.6.71
v6.6.72
v6.6.73
v6.6.74
v6.6.75
v6.6.76
v6.6.77
v6.6.78
v6.6.79
v6.6.8
v6.6.80
v6.6.81
v6.6.82
v6.6.83
v6.6.84
v6.6.85
v6.6.86
v6.6.87
v6.6.88
v6.6.89
v6.6.9
v6.6.90
v6.6.91
v6.6.92
v6.6.93
v6.6.94
v6.6.95
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

{
    "vanir_signatures": [
        {
            "signature_version": "v1",
            "target": {
                "file": "drivers/misc/tps6594-pfsm.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d27ee5c59881a64ea92e363502742cb4f38b7460",
            "deprecated": false,
            "digest": {
                "line_hashes": [
                    "92130598084219117487959190118044202133",
                    "51431837994667306569499879296013488469",
                    "318936050276699538173758773108811517342",
                    "126920515527522724415566717317450930292"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2025-38368-294f4bc7"
        },
        {
            "signature_version": "v1",
            "target": {
                "function": "tps6594_pfsm_probe",
                "file": "drivers/misc/tps6594-pfsm.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a99b598d836c9c6411110c70a2da134c78d96e67",
            "deprecated": false,
            "digest": {
                "length": 971.0,
                "function_hash": "136688219677379658958850773353597287678"
            },
            "id": "CVE-2025-38368-2dcc71e1"
        },
        {
            "signature_version": "v1",
            "target": {
                "file": "drivers/misc/tps6594-pfsm.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a8d1b4f219e8833130927f19d1c8bfbf49215ce4",
            "deprecated": false,
            "digest": {
                "line_hashes": [
                    "92130598084219117487959190118044202133",
                    "51431837994667306569499879296013488469",
                    "318936050276699538173758773108811517342",
                    "47356172477406920231067122522368938706"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2025-38368-34af05c2"
        },
        {
            "signature_version": "v1",
            "target": {
                "file": "drivers/misc/tps6594-pfsm.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a99b598d836c9c6411110c70a2da134c78d96e67",
            "deprecated": false,
            "digest": {
                "line_hashes": [
                    "92130598084219117487959190118044202133",
                    "51431837994667306569499879296013488469",
                    "318936050276699538173758773108811517342",
                    "126920515527522724415566717317450930292"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2025-38368-5ed0fe46"
        },
        {
            "signature_version": "v1",
            "target": {
                "function": "tps6594_pfsm_probe",
                "file": "drivers/misc/tps6594-pfsm.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a10c8bff454b11ef553d9df19ee722d2df34cd0e",
            "deprecated": false,
            "digest": {
                "length": 971.0,
                "function_hash": "136688219677379658958850773353597287678"
            },
            "id": "CVE-2025-38368-72cee5e5"
        },
        {
            "signature_version": "v1",
            "target": {
                "function": "tps6594_pfsm_probe",
                "file": "drivers/misc/tps6594-pfsm.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d27ee5c59881a64ea92e363502742cb4f38b7460",
            "deprecated": false,
            "digest": {
                "length": 971.0,
                "function_hash": "136688219677379658958850773353597287678"
            },
            "id": "CVE-2025-38368-ac11e6d7"
        },
        {
            "signature_version": "v1",
            "target": {
                "function": "tps6594_pfsm_probe",
                "file": "drivers/misc/tps6594-pfsm.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a8d1b4f219e8833130927f19d1c8bfbf49215ce4",
            "deprecated": false,
            "digest": {
                "length": 937.0,
                "function_hash": "43014101568423760740369949511263077549"
            },
            "id": "CVE-2025-38368-cde4731e"
        },
        {
            "signature_version": "v1",
            "target": {
                "file": "drivers/misc/tps6594-pfsm.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a10c8bff454b11ef553d9df19ee722d2df34cd0e",
            "deprecated": false,
            "digest": {
                "line_hashes": [
                    "92130598084219117487959190118044202133",
                    "51431837994667306569499879296013488469",
                    "318936050276699538173758773108811517342",
                    "126920515527522724415566717317450930292"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2025-38368-ef236ea2"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.6.96
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.36
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.5