CVE-2025-37935: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: fix SER panic with 4GB+ RAM If the mtk_poll_rx() function detects the MTK_RESETTING flag, it will jump to release_desc and refill the high word of the SDP on the 4GB RFB. Subsequently, mtk_rx_clean will process an incorrect SDP, leading to a panic. Add patch from MediaTek's SDK to resolve this.
AI Analysis
Technical Summary
CVE-2025-37935 is a vulnerability identified in the Linux kernel's MediaTek Ethernet driver (mtk_eth_soc), specifically affecting systems with 4GB or more of RAM. The issue arises within the mtk_poll_rx() function, which monitors the MTK_RESETTING flag. When this flag is detected, the function jumps to release_desc and attempts to refill the high word of the SDP (Scatter Descriptor Pointer) on the 4GB Receive Frame Buffer (RFB). However, this operation leads to mtk_rx_clean processing an incorrect SDP, which subsequently causes a kernel panic. This vulnerability is rooted in improper handling of descriptor pointers during network packet reception, resulting in system instability and denial of service. The patch to fix this issue was incorporated from MediaTek's SDK, addressing the pointer handling logic to prevent the panic condition. The vulnerability affects specific Linux kernel versions identified by the commit hash 2d75891ebc09ba9cf30697dfd54497ef0220308f. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments running Linux systems with MediaTek Ethernet hardware and 4GB or more RAM, such as embedded devices, network appliances, or servers using this specific driver. The main impact is a denial of service through kernel panic, which can cause system crashes and downtime. This can disrupt critical services, especially in sectors relying on continuous network availability like telecommunications, finance, healthcare, and industrial control systems. Although no remote code execution or privilege escalation is indicated, the forced system reboots or crashes can lead to operational disruptions and potential data loss if systems are not properly backed up or if the crashes occur during critical operations. The lack of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels means that unpatched systems remain vulnerable to potential future exploitation, especially in targeted attacks against infrastructure using MediaTek Ethernet components.
Mitigation Recommendations
Organizations should promptly identify Linux systems utilizing the MediaTek Ethernet driver (mtk_eth_soc) with 4GB+ RAM and verify kernel versions against the affected commit. Applying the official patch from MediaTek's SDK or updating to a Linux kernel version that includes the fix is the primary mitigation. Network administrators should monitor system logs for signs of kernel panics related to network drivers. For embedded or specialized devices where kernel updates are challenging, consider isolating affected devices from critical network segments or implementing redundancy to mitigate downtime. Additionally, implement robust backup and recovery procedures to minimize impact from unexpected crashes. Regular vulnerability scanning and inventory management can help identify at-risk systems. Since no known exploits exist, proactive patching is the best defense to prevent potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Finland
CVE-2025-37935: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: fix SER panic with 4GB+ RAM If the mtk_poll_rx() function detects the MTK_RESETTING flag, it will jump to release_desc and refill the high word of the SDP on the 4GB RFB. Subsequently, mtk_rx_clean will process an incorrect SDP, leading to a panic. Add patch from MediaTek's SDK to resolve this.
AI-Powered Analysis
Technical Analysis
CVE-2025-37935 is a vulnerability identified in the Linux kernel's MediaTek Ethernet driver (mtk_eth_soc), specifically affecting systems with 4GB or more of RAM. The issue arises within the mtk_poll_rx() function, which monitors the MTK_RESETTING flag. When this flag is detected, the function jumps to release_desc and attempts to refill the high word of the SDP (Scatter Descriptor Pointer) on the 4GB Receive Frame Buffer (RFB). However, this operation leads to mtk_rx_clean processing an incorrect SDP, which subsequently causes a kernel panic. This vulnerability is rooted in improper handling of descriptor pointers during network packet reception, resulting in system instability and denial of service. The patch to fix this issue was incorporated from MediaTek's SDK, addressing the pointer handling logic to prevent the panic condition. The vulnerability affects specific Linux kernel versions identified by the commit hash 2d75891ebc09ba9cf30697dfd54497ef0220308f. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments running Linux systems with MediaTek Ethernet hardware and 4GB or more RAM, such as embedded devices, network appliances, or servers using this specific driver. The main impact is a denial of service through kernel panic, which can cause system crashes and downtime. This can disrupt critical services, especially in sectors relying on continuous network availability like telecommunications, finance, healthcare, and industrial control systems. Although no remote code execution or privilege escalation is indicated, the forced system reboots or crashes can lead to operational disruptions and potential data loss if systems are not properly backed up or if the crashes occur during critical operations. The lack of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels means that unpatched systems remain vulnerable to potential future exploitation, especially in targeted attacks against infrastructure using MediaTek Ethernet components.
Mitigation Recommendations
Organizations should promptly identify Linux systems utilizing the MediaTek Ethernet driver (mtk_eth_soc) with 4GB+ RAM and verify kernel versions against the affected commit. Applying the official patch from MediaTek's SDK or updating to a Linux kernel version that includes the fix is the primary mitigation. Network administrators should monitor system logs for signs of kernel panics related to network drivers. For embedded or specialized devices where kernel updates are challenging, consider isolating affected devices from critical network segments or implementing redundancy to mitigate downtime. Additionally, implement robust backup and recovery procedures to minimize impact from unexpected crashes. Regular vulnerability scanning and inventory management can help identify at-risk systems. Since no known exploits exist, proactive patching is the best defense to prevent potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.971Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeafb1
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 1:57:27 AM
Last updated: 8/21/2025, 12:27:43 PM
Views: 21
Related Threats
CVE-2025-55581: n/a
UnknownCVE-2025-52085: n/a
UnknownCVE-2025-43760: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-55613: n/a
HighCVE-2025-57800: CWE-523: Unprotected Transport of Credentials in advplyr audiobookshelf
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.