In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: mtk_eth_soc: fix SER panic with 4GB+ RAM
If the mtk_poll_rx() function detects the MTK_RESETTING flag, it will
jump to release_desc and refill the high word of the SDP on the 4GB RFB.
Subsequently, mtk_rx_clean will process an incorrect SDP, leading to a
panic.
Add patch from MediaTek's SDK to resolve this.
References
Configurations
Configuration 1 (hide)
|
History
17 Nov 2025, 15:00
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux linux Kernel
Linux |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/317013d1ad13524be02d60b9e98f08fbd13f8c14 - Patch | |
| References | () https://git.kernel.org/stable/c/67619cf69dec5d1d7792808dfa548616742dd51d - Patch | |
| References | () https://git.kernel.org/stable/c/6e0490fc36cdac696f96e57b61d93b9ae32e0f4c - Patch | |
| References | () https://git.kernel.org/stable/c/cb625f783f70dc6614f03612b8e64ad99cb0a13c - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
Information
Published : 2025-05-20 16:15
Updated : 2025-11-17 15:00
NVD link : CVE-2025-37935
Mitre link : CVE-2025-37935
CVE.ORG link : CVE-2025-37935
JSON object : View
Products Affected
linux
- linux_kernel
CWE
