CVE-2025-37977: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: exynos: Disable iocc if dma-coherent property isn't set If dma-coherent property isn't set then descriptors are non-cacheable and the iocc shareability bits should be disabled. Without this UFS can end up in an incompatible configuration and suffer from random cache related stability issues.
AI Analysis
Technical Summary
CVE-2025-37977 is a vulnerability identified in the Linux kernel specifically affecting the SCSI UFS (Universal Flash Storage) driver implementation on Exynos platforms. The issue arises when the 'dma-coherent' property is not set for the UFS device descriptors. In such cases, the descriptors become non-cacheable, but the IO Cache Controller (iocc) shareability bits remain enabled, leading to an incompatible configuration. This misconfiguration can cause random cache-related stability problems, potentially resulting in system instability or crashes. The vulnerability is rooted in improper handling of DMA (Direct Memory Access) descriptor cacheability settings, which can affect the integrity and availability of the system's storage operations. The fix involves disabling the iocc shareability bits when the dma-coherent property is absent, ensuring that the descriptors are handled correctly and preventing cache coherency issues. This vulnerability is specific to certain Linux kernel commits and affects systems running on Exynos SoCs using the UFS storage interface. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2025-37977 primarily concerns systems utilizing Linux kernels on Exynos-based hardware with UFS storage devices, such as embedded systems, mobile devices, or specialized industrial equipment. The vulnerability can lead to random system instability or crashes due to cache coherency issues, potentially causing data corruption or loss of availability. Organizations relying on such hardware for critical operations may face disruptions, increased downtime, and potential data integrity issues. Although the vulnerability does not directly expose confidentiality risks or allow remote code execution, the resulting instability can affect service continuity and reliability. This is particularly relevant for sectors like telecommunications, manufacturing, automotive, and IoT deployments in Europe where Exynos-based Linux systems might be deployed. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to future exploitation or accidental failures triggered by this flaw.
Mitigation Recommendations
To mitigate CVE-2025-37977, European organizations should: 1) Identify all Linux systems running on Exynos platforms with UFS storage interfaces, especially those using affected kernel versions. 2) Apply the official Linux kernel patches that disable the iocc shareability bits when the dma-coherent property is not set, ensuring proper cache handling. 3) Test updated kernels in controlled environments to verify stability improvements before wide deployment. 4) Monitor system logs and hardware error reports for signs of cache-related instability or crashes. 5) For embedded or specialized devices where kernel updates are challenging, consider vendor firmware updates or workarounds that enforce correct DMA descriptor cacheability settings. 6) Maintain an inventory of affected devices and coordinate with hardware vendors for timely patch releases. 7) Implement robust backup and recovery procedures to minimize data loss risks from unexpected system failures. These steps go beyond generic advice by focusing on hardware-specific configurations and proactive system monitoring.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-37977: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: exynos: Disable iocc if dma-coherent property isn't set If dma-coherent property isn't set then descriptors are non-cacheable and the iocc shareability bits should be disabled. Without this UFS can end up in an incompatible configuration and suffer from random cache related stability issues.
AI-Powered Analysis
Technical Analysis
CVE-2025-37977 is a vulnerability identified in the Linux kernel specifically affecting the SCSI UFS (Universal Flash Storage) driver implementation on Exynos platforms. The issue arises when the 'dma-coherent' property is not set for the UFS device descriptors. In such cases, the descriptors become non-cacheable, but the IO Cache Controller (iocc) shareability bits remain enabled, leading to an incompatible configuration. This misconfiguration can cause random cache-related stability problems, potentially resulting in system instability or crashes. The vulnerability is rooted in improper handling of DMA (Direct Memory Access) descriptor cacheability settings, which can affect the integrity and availability of the system's storage operations. The fix involves disabling the iocc shareability bits when the dma-coherent property is absent, ensuring that the descriptors are handled correctly and preventing cache coherency issues. This vulnerability is specific to certain Linux kernel commits and affects systems running on Exynos SoCs using the UFS storage interface. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2025-37977 primarily concerns systems utilizing Linux kernels on Exynos-based hardware with UFS storage devices, such as embedded systems, mobile devices, or specialized industrial equipment. The vulnerability can lead to random system instability or crashes due to cache coherency issues, potentially causing data corruption or loss of availability. Organizations relying on such hardware for critical operations may face disruptions, increased downtime, and potential data integrity issues. Although the vulnerability does not directly expose confidentiality risks or allow remote code execution, the resulting instability can affect service continuity and reliability. This is particularly relevant for sectors like telecommunications, manufacturing, automotive, and IoT deployments in Europe where Exynos-based Linux systems might be deployed. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to future exploitation or accidental failures triggered by this flaw.
Mitigation Recommendations
To mitigate CVE-2025-37977, European organizations should: 1) Identify all Linux systems running on Exynos platforms with UFS storage interfaces, especially those using affected kernel versions. 2) Apply the official Linux kernel patches that disable the iocc shareability bits when the dma-coherent property is not set, ensuring proper cache handling. 3) Test updated kernels in controlled environments to verify stability improvements before wide deployment. 4) Monitor system logs and hardware error reports for signs of cache-related instability or crashes. 5) For embedded or specialized devices where kernel updates are challenging, consider vendor firmware updates or workarounds that enforce correct DMA descriptor cacheability settings. 6) Maintain an inventory of affected devices and coordinate with hardware vendors for timely patch releases. 7) Implement robust backup and recovery procedures to minimize data loss risks from unexpected system failures. These steps go beyond generic advice by focusing on hardware-specific configurations and proactive system monitoring.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.975Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeae09
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/3/2025, 7:12:13 PM
Last updated: 7/30/2025, 4:08:44 PM
Views: 11
Related Threats
CVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.