CVE-2025-38210
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
04/07/2025
Last modified:
18/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
configfs-tsm-report: Fix NULL dereference of tsm_ops<br />
<br />
Unlike sysfs, the lifetime of configfs objects is controlled by<br />
userspace. There is no mechanism for the kernel to find and delete all<br />
created config-items. Instead, the configfs-tsm-report mechanism has an<br />
expectation that tsm_unregister() can happen at any time and cause<br />
established config-item access to start failing.<br />
<br />
That expectation is not fully satisfied. While tsm_report_read(),<br />
tsm_report_{is,is_bin}_visible(), and tsm_report_make_item() safely fail<br />
if tsm_ops have been unregistered, tsm_report_privlevel_store()<br />
tsm_report_provider_show() fail to check for ops registration. Add the<br />
missing checks for tsm_ops having been removed.<br />
<br />
Now, in supporting the ability for tsm_unregister() to always succeed,<br />
it leaves the problem of what to do with lingering config-items. The<br />
expectation is that the admin that arranges for the ->remove() (unbind)<br />
of the ${tsm_arch}-guest driver is also responsible for deletion of all<br />
open config-items. Until that deletion happens, ->probe() (reload /<br />
bind) of the ${tsm_arch}-guest driver fails.<br />
<br />
This allows for emergency shutdown / revocation of attestation<br />
interfaces, and requires coordinated restart.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



