CVE-2025-37917

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/05/2025
Last modified:
17/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: ethernet: mtk-star-emac: fix spinlock recursion issues on rx/tx poll<br /> <br /> Use spin_lock_irqsave and spin_unlock_irqrestore instead of spin_lock<br /> and spin_unlock in mtk_star_emac driver to avoid spinlock recursion<br /> occurrence that can happen when enabling the DMA interrupts again in<br /> rx/tx poll.<br /> <br /> ```<br /> BUG: spinlock recursion on CPU#0, swapper/0/0<br /> lock: 0xffff00000db9cf20, .magic: dead4ead, .owner: swapper/0/0,<br /> .owner_cpu: 0<br /> CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted<br /> 6.15.0-rc2-next-20250417-00001-gf6a27738686c-dirty #28 PREEMPT<br /> Hardware name: MediaTek MT8365 Open Platform EVK (DT)<br /> Call trace:<br /> show_stack+0x18/0x24 (C)<br /> dump_stack_lvl+0x60/0x80<br /> dump_stack+0x18/0x24<br /> spin_dump+0x78/0x88<br /> do_raw_spin_lock+0x11c/0x120<br /> _raw_spin_lock+0x20/0x2c<br /> mtk_star_handle_irq+0xc0/0x22c [mtk_star_emac]<br /> __handle_irq_event_percpu+0x48/0x140<br /> handle_irq_event+0x4c/0xb0<br /> handle_fasteoi_irq+0xa0/0x1bc<br /> handle_irq_desc+0x34/0x58<br /> generic_handle_domain_irq+0x1c/0x28<br /> gic_handle_irq+0x4c/0x120<br /> do_interrupt_handler+0x50/0x84<br /> el1_interrupt+0x34/0x68<br /> el1h_64_irq_handler+0x18/0x24<br /> el1h_64_irq+0x6c/0x70<br /> regmap_mmio_read32le+0xc/0x20 (P)<br /> _regmap_bus_reg_read+0x6c/0xac<br /> _regmap_read+0x60/0xdc<br /> regmap_read+0x4c/0x80<br /> mtk_star_rx_poll+0x2f4/0x39c [mtk_star_emac]<br /> __napi_poll+0x38/0x188<br /> net_rx_action+0x164/0x2c0<br /> handle_softirqs+0x100/0x244<br /> __do_softirq+0x14/0x20<br /> ____do_softirq+0x10/0x20<br /> call_on_irq_stack+0x24/0x64<br /> do_softirq_own_stack+0x1c/0x40<br /> __irq_exit_rcu+0xd4/0x10c<br /> irq_exit_rcu+0x10/0x1c<br /> el1_interrupt+0x38/0x68<br /> el1h_64_irq_handler+0x18/0x24<br /> el1h_64_irq+0x6c/0x70<br /> cpuidle_enter_state+0xac/0x320 (P)<br /> cpuidle_enter+0x38/0x50<br /> do_idle+0x1e4/0x260<br /> cpu_startup_entry+0x34/0x3c<br /> rest_init+0xdc/0xe0<br /> console_on_rootfs+0x0/0x6c<br /> __primary_switched+0x88/0x90<br /> ```

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.0 (including) 6.1.138 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.90 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.28 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.14.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*