CVE-2025-37875: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: igc: fix PTM cycle trigger logic Writing to clear the PTM status 'valid' bit while the PTM cycle is triggered results in unreliable PTM operation. To fix this, clear the PTM 'trigger' and status after each PTM transaction. The issue can be reproduced with the following: $ sudo phc2sys -R 1000 -O 0 -i tsn0 -m Note: 1000 Hz (-R 1000) is unrealistically large, but provides a way to quickly reproduce the issue. PHC2SYS exits with: "ioctl PTP_OFFSET_PRECISE: Connection timed out" when the PTM transaction fails This patch also fixes a hang in igc_probe() when loading the igc driver in the kdump kernel on systems supporting PTM. The igc driver running in the base kernel enables PTM trigger in igc_probe(). Therefore the driver is always in PTM trigger mode, except in brief periods when manually triggering a PTM cycle. When a crash occurs, the NIC is reset while PTM trigger is enabled. Due to a hardware problem, the NIC is subsequently in a bad busmaster state and doesn't handle register reads/writes. When running igc_probe() in the kdump kernel, the first register access to a NIC register hangs driver probing and ultimately breaks kdump. With this patch, igc has PTM trigger disabled most of the time, and the trigger is only enabled for very brief (10 - 100 us) periods when manually triggering a PTM cycle. Chances that a crash occurs during a PTM trigger are not 0, but extremely reduced.
AI Analysis
Technical Summary
CVE-2025-37875 is a vulnerability identified in the Linux kernel's igc network driver, which manages Intel Gigabit Ethernet controllers. The flaw relates to the Precision Time Measurement (PTM) cycle trigger logic. Specifically, writing to clear the PTM status 'valid' bit while a PTM cycle is triggered leads to unreliable PTM operation. This can cause the PHC2SYS utility, which synchronizes system clocks using the PTP hardware clock, to fail with a timeout error during PTM transactions. Additionally, the vulnerability causes a hang during the igc driver's probe phase in the kdump kernel environment, which is used for crash dump collection. This hang occurs because when a system crash happens while PTM trigger is enabled, the NIC hardware enters a faulty busmaster state and becomes unresponsive to register reads/writes. Consequently, the driver probing process stalls, breaking the kdump functionality and potentially impeding post-crash diagnostics. The patch for this vulnerability modifies the igc driver to keep PTM trigger disabled most of the time, enabling it only briefly (10-100 microseconds) during manual PTM cycle triggers. This significantly reduces the likelihood of a crash occurring during an active PTM trigger, mitigating the risk of NIC busmaster lockup and driver hangs. The vulnerability can be reproduced using the command "sudo phc2sys -R 1000 -O 0 -i tsn0 -m", which forces rapid PTM cycles and triggers the failure. No known exploits are reported in the wild, and the issue primarily affects systems using the igc driver with PTM support enabled. The vulnerability impacts system stability and reliability, particularly in environments relying on precise time synchronization and crash dump collection.
Potential Impact
For European organizations, this vulnerability poses risks primarily to infrastructure relying on Linux systems with Intel Gigabit Ethernet controllers using the igc driver and PTM features. The failure of PTM cycles can degrade time synchronization accuracy, which is critical for telecommunications, financial trading platforms, industrial automation, and other time-sensitive applications prevalent in Europe. More critically, the hang during driver probing in the kdump kernel can prevent successful crash dump collection, hindering root cause analysis and recovery efforts after system failures. This can increase downtime and complicate incident response in enterprise and data center environments. Organizations with high availability requirements or those operating critical infrastructure may face operational disruptions. Although no direct remote code execution or data breach is indicated, the reliability and availability impacts can indirectly affect confidentiality and integrity by delaying detection and remediation of other issues. The vulnerability is less likely to be exploited for direct attacks but can be leveraged in targeted scenarios to cause denial of service or complicate forensic investigations.
Mitigation Recommendations
European organizations should ensure that Linux kernel versions are updated to include the patch that disables PTM trigger except during brief manual triggers. Specifically, kernel updates containing the fix for CVE-2025-37875 should be applied promptly on all affected systems. Network administrators should audit systems using the igc driver and verify PTM usage, disabling PTM features if not required to reduce exposure. For systems relying on PTM for time synchronization, consider alternative synchronization methods or hardware that do not exhibit this issue until patched. Additionally, testing crash dump mechanisms post-patch is recommended to confirm that kdump functionality is restored. Monitoring for unusual time synchronization errors or driver hangs can help detect attempts to trigger the vulnerability. In environments where patching is delayed, implementing system-level watchdogs or automated recovery scripts to handle potential hangs may reduce downtime. Coordination with hardware vendors for firmware updates or advisories related to NIC busmaster behavior is also advisable.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2025-37875: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: igc: fix PTM cycle trigger logic Writing to clear the PTM status 'valid' bit while the PTM cycle is triggered results in unreliable PTM operation. To fix this, clear the PTM 'trigger' and status after each PTM transaction. The issue can be reproduced with the following: $ sudo phc2sys -R 1000 -O 0 -i tsn0 -m Note: 1000 Hz (-R 1000) is unrealistically large, but provides a way to quickly reproduce the issue. PHC2SYS exits with: "ioctl PTP_OFFSET_PRECISE: Connection timed out" when the PTM transaction fails This patch also fixes a hang in igc_probe() when loading the igc driver in the kdump kernel on systems supporting PTM. The igc driver running in the base kernel enables PTM trigger in igc_probe(). Therefore the driver is always in PTM trigger mode, except in brief periods when manually triggering a PTM cycle. When a crash occurs, the NIC is reset while PTM trigger is enabled. Due to a hardware problem, the NIC is subsequently in a bad busmaster state and doesn't handle register reads/writes. When running igc_probe() in the kdump kernel, the first register access to a NIC register hangs driver probing and ultimately breaks kdump. With this patch, igc has PTM trigger disabled most of the time, and the trigger is only enabled for very brief (10 - 100 us) periods when manually triggering a PTM cycle. Chances that a crash occurs during a PTM trigger are not 0, but extremely reduced.
AI-Powered Analysis
Technical Analysis
CVE-2025-37875 is a vulnerability identified in the Linux kernel's igc network driver, which manages Intel Gigabit Ethernet controllers. The flaw relates to the Precision Time Measurement (PTM) cycle trigger logic. Specifically, writing to clear the PTM status 'valid' bit while a PTM cycle is triggered leads to unreliable PTM operation. This can cause the PHC2SYS utility, which synchronizes system clocks using the PTP hardware clock, to fail with a timeout error during PTM transactions. Additionally, the vulnerability causes a hang during the igc driver's probe phase in the kdump kernel environment, which is used for crash dump collection. This hang occurs because when a system crash happens while PTM trigger is enabled, the NIC hardware enters a faulty busmaster state and becomes unresponsive to register reads/writes. Consequently, the driver probing process stalls, breaking the kdump functionality and potentially impeding post-crash diagnostics. The patch for this vulnerability modifies the igc driver to keep PTM trigger disabled most of the time, enabling it only briefly (10-100 microseconds) during manual PTM cycle triggers. This significantly reduces the likelihood of a crash occurring during an active PTM trigger, mitigating the risk of NIC busmaster lockup and driver hangs. The vulnerability can be reproduced using the command "sudo phc2sys -R 1000 -O 0 -i tsn0 -m", which forces rapid PTM cycles and triggers the failure. No known exploits are reported in the wild, and the issue primarily affects systems using the igc driver with PTM support enabled. The vulnerability impacts system stability and reliability, particularly in environments relying on precise time synchronization and crash dump collection.
Potential Impact
For European organizations, this vulnerability poses risks primarily to infrastructure relying on Linux systems with Intel Gigabit Ethernet controllers using the igc driver and PTM features. The failure of PTM cycles can degrade time synchronization accuracy, which is critical for telecommunications, financial trading platforms, industrial automation, and other time-sensitive applications prevalent in Europe. More critically, the hang during driver probing in the kdump kernel can prevent successful crash dump collection, hindering root cause analysis and recovery efforts after system failures. This can increase downtime and complicate incident response in enterprise and data center environments. Organizations with high availability requirements or those operating critical infrastructure may face operational disruptions. Although no direct remote code execution or data breach is indicated, the reliability and availability impacts can indirectly affect confidentiality and integrity by delaying detection and remediation of other issues. The vulnerability is less likely to be exploited for direct attacks but can be leveraged in targeted scenarios to cause denial of service or complicate forensic investigations.
Mitigation Recommendations
European organizations should ensure that Linux kernel versions are updated to include the patch that disables PTM trigger except during brief manual triggers. Specifically, kernel updates containing the fix for CVE-2025-37875 should be applied promptly on all affected systems. Network administrators should audit systems using the igc driver and verify PTM usage, disabling PTM features if not required to reduce exposure. For systems relying on PTM for time synchronization, consider alternative synchronization methods or hardware that do not exhibit this issue until patched. Additionally, testing crash dump mechanisms post-patch is recommended to confirm that kdump functionality is restored. Monitoring for unusual time synchronization errors or driver hangs can help detect attempts to trigger the vulnerability. In environments where patching is delayed, implementing system-level watchdogs or automated recovery scripts to handle potential hangs may reduce downtime. Coordination with hardware vendors for firmware updates or advisories related to NIC busmaster behavior is also advisable.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.960Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd7d6b
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/4/2025, 12:55:40 AM
Last updated: 8/8/2025, 6:31:19 AM
Views: 15
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.