Skip to main content

CVE-2025-37935: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-37935cvecve-2025-37935
Published: Tue May 20 2025 (05/20/2025, 15:21:59 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: fix SER panic with 4GB+ RAM If the mtk_poll_rx() function detects the MTK_RESETTING flag, it will jump to release_desc and refill the high word of the SDP on the 4GB RFB. Subsequently, mtk_rx_clean will process an incorrect SDP, leading to a panic. Add patch from MediaTek's SDK to resolve this.

AI-Powered Analysis

AILast updated: 07/04/2025, 01:57:27 UTC

Technical Analysis

CVE-2025-37935 is a vulnerability identified in the Linux kernel's MediaTek Ethernet driver (mtk_eth_soc), specifically affecting systems with 4GB or more of RAM. The issue arises within the mtk_poll_rx() function, which monitors the MTK_RESETTING flag. When this flag is detected, the function jumps to release_desc and attempts to refill the high word of the SDP (Scatter Descriptor Pointer) on the 4GB Receive Frame Buffer (RFB). However, this operation leads to mtk_rx_clean processing an incorrect SDP, which subsequently causes a kernel panic. This vulnerability is rooted in improper handling of descriptor pointers during network packet reception, resulting in system instability and denial of service. The patch to fix this issue was incorporated from MediaTek's SDK, addressing the pointer handling logic to prevent the panic condition. The vulnerability affects specific Linux kernel versions identified by the commit hash 2d75891ebc09ba9cf30697dfd54497ef0220308f. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments running Linux systems with MediaTek Ethernet hardware and 4GB or more RAM, such as embedded devices, network appliances, or servers using this specific driver. The main impact is a denial of service through kernel panic, which can cause system crashes and downtime. This can disrupt critical services, especially in sectors relying on continuous network availability like telecommunications, finance, healthcare, and industrial control systems. Although no remote code execution or privilege escalation is indicated, the forced system reboots or crashes can lead to operational disruptions and potential data loss if systems are not properly backed up or if the crashes occur during critical operations. The lack of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels means that unpatched systems remain vulnerable to potential future exploitation, especially in targeted attacks against infrastructure using MediaTek Ethernet components.

Mitigation Recommendations

Organizations should promptly identify Linux systems utilizing the MediaTek Ethernet driver (mtk_eth_soc) with 4GB+ RAM and verify kernel versions against the affected commit. Applying the official patch from MediaTek's SDK or updating to a Linux kernel version that includes the fix is the primary mitigation. Network administrators should monitor system logs for signs of kernel panics related to network drivers. For embedded or specialized devices where kernel updates are challenging, consider isolating affected devices from critical network segments or implementing redundancy to mitigate downtime. Additionally, implement robust backup and recovery procedures to minimize impact from unexpected crashes. Regular vulnerability scanning and inventory management can help identify at-risk systems. Since no known exploits exist, proactive patching is the best defense to prevent potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.971Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeafb1

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 1:57:27 AM

Last updated: 8/21/2025, 12:27:43 PM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats