CVE-2025-38662

7.8 HIGH

📋 TL;DR

This CVE describes a memory corruption vulnerability in the Linux kernel's MediaTek MT8365 audio subsystem driver. An incorrect size parameter passed to a memory copy function allows out-of-bounds memory access, potentially leading to kernel crashes or arbitrary code execution. Systems using Linux kernels with the affected MediaTek audio driver are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with MediaTek MT8365 audio driver
Versions: Linux kernel versions containing the vulnerable snd_soc_mt8365_pcm driver before the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only systems with MediaTek MT8365 SoC and the snd_soc_mt8365_pcm driver loaded are affected. The driver may be compiled as a module or built into the kernel.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory corruption leading to arbitrary code execution with kernel privileges, potentially resulting in full system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Kernel panic or system crash causing denial of service, requiring physical access or reboot to restore functionality.

🟢

If Mitigated

Kernel Address Sanitizer (KASAN) detection prevents exploitation but may cause system instability or crashes.

🌐 Internet-Facing: LOW - This is a local kernel driver vulnerability requiring local access or ability to load malicious kernel modules.
🏢 Internal Only: MEDIUM - Malicious local users or compromised applications could exploit this to escalate privileges or crash systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM - Requires understanding of kernel memory layout and driver interaction, but the vulnerability is straightforward memory corruption.

Exploitation requires local access and ability to interact with the audio subsystem driver. The KASAN detection makes exploitation more difficult but not impossible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 1dc0ed16cfbc3c28a07a89904071cfa802fdcee1, 6bea85979d05470e6416a2bb504a9bcd9178304c, 6e621dd99c57db916842865debaa65f20bbd6d8e

Vendor Advisory: https://git.kernel.org/stable/c/1dc0ed16cfbc3c28a07a89904071cfa802fdcee1

Restart Required: Yes

Instructions:

1. Update to a Linux kernel version containing the fix commits. 2. Rebuild kernel if using custom kernel. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable vulnerable driver module

linux

Prevent loading of the snd_soc_mt8365_pcm kernel module if not required

echo 'blacklist snd_soc_mt8365_pcm' >> /etc/modprobe.d/blacklist-mt8365.conf
rmmod snd_soc_mt8365_pcm

Enable kernel hardening features

linux

Enable Kernel Address Sanitizer (KASAN) and other memory protection features

Add 'kasan' to kernel command line parameters in bootloader configuration

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable driver
  • Implement strict SELinux/AppArmor policies to limit driver interaction

🔍 How to Verify

Check if Vulnerable:

Check if snd_soc_mt8365_pcm module is loaded: lsmod | grep snd_soc_mt8365_pcm

Check Version:

uname -r

Verify Fix Applied:

Check kernel version includes fix commits: grep -q '1dc0ed16cfbc3c28a07a89904071cfa802fdcee1\|6bea85979d05470e6416a2bb504a9bcd9178304c\|6e621dd99c57db916842865debaa65f20bbd6d8e' /proc/version

📡 Detection & Monitoring

Log Indicators:

  • KASAN error messages in kernel logs
  • BUG: KASAN: global-out-of-bounds
  • Call trace showing mt8365_dai_set_priv

Network Indicators:

  • No network indicators - local vulnerability only

SIEM Query:

source="kernel" AND "KASAN" AND "mt8365"

🔗 References

📤 Share & Export