CVE-2025-37875
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/05/2025
Last modified:
12/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
igc: fix PTM cycle trigger logic<br />
<br />
Writing to clear the PTM status &#39;valid&#39; bit while the PTM cycle is<br />
triggered results in unreliable PTM operation. To fix this, clear the<br />
PTM &#39;trigger&#39; and status after each PTM transaction.<br />
<br />
The issue can be reproduced with the following:<br />
<br />
$ sudo phc2sys -R 1000 -O 0 -i tsn0 -m<br />
<br />
Note: 1000 Hz (-R 1000) is unrealistically large, but provides a way to<br />
quickly reproduce the issue.<br />
<br />
PHC2SYS exits with:<br />
<br />
"ioctl PTP_OFFSET_PRECISE: Connection timed out" when the PTM transaction<br />
fails<br />
<br />
This patch also fixes a hang in igc_probe() when loading the igc<br />
driver in the kdump kernel on systems supporting PTM.<br />
<br />
The igc driver running in the base kernel enables PTM trigger in<br />
igc_probe(). Therefore the driver is always in PTM trigger mode,<br />
except in brief periods when manually triggering a PTM cycle.<br />
<br />
When a crash occurs, the NIC is reset while PTM trigger is enabled.<br />
Due to a hardware problem, the NIC is subsequently in a bad busmaster<br />
state and doesn&#39;t handle register reads/writes. When running<br />
igc_probe() in the kdump kernel, the first register access to a NIC<br />
register hangs driver probing and ultimately breaks kdump.<br />
<br />
With this patch, igc has PTM trigger disabled most of the time,<br />
and the trigger is only enabled for very brief (10 - 100 us) periods<br />
when manually triggering a PTM cycle. Chances that a crash occurs<br />
during a PTM trigger are not 0, but extremely reduced.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.181 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.135 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.88 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.25 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0c03e4fbe1321697d9d04587e21e416705e1b19f
- https://git.kernel.org/stable/c/16194ca3f3b4448a062650c869a7b3b206c6f5d3
- https://git.kernel.org/stable/c/31959e06143692f7e02b8eef7d7d6ac645637906
- https://git.kernel.org/stable/c/8e404ad95d2c10c261e2ef6992c7c12dde03df0e
- https://git.kernel.org/stable/c/c1f174edaccc5a00f8e218c42a0aa9156efd5f76
- https://git.kernel.org/stable/c/f3516229cd12dcd45f23ed01adab17e8772b1bd5
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



