CVE-2025-37802: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix WARNING "do not call blocking ops when !TASK_RUNNING" wait_event_timeout() will set the state of the current task to TASK_UNINTERRUPTIBLE, before doing the condition check. This means that ksmbd_durable_scavenger_alive() will try to acquire the mutex while already in a sleeping state. The scheduler warns us by giving the following warning: do not call blocking ops when !TASK_RUNNING; state=2 set at [<0000000061515a6f>] prepare_to_wait_event+0x9f/0x6c0 WARNING: CPU: 2 PID: 4147 at kernel/sched/core.c:10099 __might_sleep+0x12f/0x160 mutex lock is not needed in ksmbd_durable_scavenger_alive().
AI Analysis
Technical Summary
CVE-2025-37802 is a vulnerability identified in the Linux kernel, specifically within the ksmbd (Kernel SMB Daemon) component. The issue arises from improper handling of task states during mutex locking operations in the function ksmbd_durable_scavenger_alive(). The vulnerability is triggered because wait_event_timeout() sets the current task's state to TASK_UNINTERRUPTIBLE before checking the condition. Consequently, ksmbd_durable_scavenger_alive() attempts to acquire a mutex lock while the task is already in a sleeping state, which violates kernel scheduling rules and triggers a warning: "do not call blocking ops when !TASK_RUNNING". This improper locking can lead to kernel warnings and potentially unstable behavior or deadlocks within the ksmbd service. The root cause is that the mutex lock in ksmbd_durable_scavenger_alive() is unnecessary and should be removed to prevent blocking operations during non-runnable task states. Although no known exploits are currently reported in the wild, the vulnerability could cause system instability or denial of service (DoS) conditions if triggered. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in recent kernel builds prior to the patch. No CVSS score has been assigned yet, and no public patch links are provided in the data, but the issue is acknowledged and published as of May 2025.
Potential Impact
For European organizations, the impact of CVE-2025-37802 primarily concerns systems running Linux kernels with the vulnerable ksmbd implementation, especially those utilizing SMB services for file sharing and network resource access. The vulnerability could lead to kernel warnings, potential deadlocks, or crashes in the ksmbd service, resulting in denial of service for SMB clients. This can disrupt critical file sharing and collaboration services, impacting business continuity, especially in sectors relying heavily on Linux-based infrastructure such as finance, telecommunications, and public administration. While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the resulting instability could be exploited as part of a broader attack chain or cause operational disruptions. Given the widespread use of Linux in European data centers, cloud environments, and enterprise servers, unpatched systems may face increased risk of service outages. Additionally, organizations with strict uptime and availability requirements could experience reputational and financial damage if SMB services are interrupted. The lack of known exploits reduces immediate risk, but the vulnerability's presence in kernel-level code warrants prompt attention to avoid potential exploitation or accidental system failures.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is resolved. Since the root cause is the unnecessary mutex lock in ksmbd_durable_scavenger_alive(), applying the official kernel patch that removes this locking behavior is essential. Organizations should: 1) Identify all Linux systems running vulnerable kernel versions, focusing on those providing SMB services via ksmbd. 2) Schedule and perform kernel upgrades to the latest stable releases containing the fix. 3) Monitor kernel logs for warnings related to "do not call blocking ops when !TASK_RUNNING" as an indicator of potential exposure. 4) Implement robust testing in staging environments to verify that SMB services remain stable post-patch. 5) Consider temporary mitigation by limiting SMB service usage or isolating vulnerable hosts until patches are applied. 6) Engage with Linux distribution vendors for timely security advisories and patches. 7) Maintain comprehensive backup and recovery plans to mitigate potential service disruptions. These steps go beyond generic advice by focusing on kernel-level patching, targeted monitoring, and operational continuity planning specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2025-37802: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix WARNING "do not call blocking ops when !TASK_RUNNING" wait_event_timeout() will set the state of the current task to TASK_UNINTERRUPTIBLE, before doing the condition check. This means that ksmbd_durable_scavenger_alive() will try to acquire the mutex while already in a sleeping state. The scheduler warns us by giving the following warning: do not call blocking ops when !TASK_RUNNING; state=2 set at [<0000000061515a6f>] prepare_to_wait_event+0x9f/0x6c0 WARNING: CPU: 2 PID: 4147 at kernel/sched/core.c:10099 __might_sleep+0x12f/0x160 mutex lock is not needed in ksmbd_durable_scavenger_alive().
AI-Powered Analysis
Technical Analysis
CVE-2025-37802 is a vulnerability identified in the Linux kernel, specifically within the ksmbd (Kernel SMB Daemon) component. The issue arises from improper handling of task states during mutex locking operations in the function ksmbd_durable_scavenger_alive(). The vulnerability is triggered because wait_event_timeout() sets the current task's state to TASK_UNINTERRUPTIBLE before checking the condition. Consequently, ksmbd_durable_scavenger_alive() attempts to acquire a mutex lock while the task is already in a sleeping state, which violates kernel scheduling rules and triggers a warning: "do not call blocking ops when !TASK_RUNNING". This improper locking can lead to kernel warnings and potentially unstable behavior or deadlocks within the ksmbd service. The root cause is that the mutex lock in ksmbd_durable_scavenger_alive() is unnecessary and should be removed to prevent blocking operations during non-runnable task states. Although no known exploits are currently reported in the wild, the vulnerability could cause system instability or denial of service (DoS) conditions if triggered. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in recent kernel builds prior to the patch. No CVSS score has been assigned yet, and no public patch links are provided in the data, but the issue is acknowledged and published as of May 2025.
Potential Impact
For European organizations, the impact of CVE-2025-37802 primarily concerns systems running Linux kernels with the vulnerable ksmbd implementation, especially those utilizing SMB services for file sharing and network resource access. The vulnerability could lead to kernel warnings, potential deadlocks, or crashes in the ksmbd service, resulting in denial of service for SMB clients. This can disrupt critical file sharing and collaboration services, impacting business continuity, especially in sectors relying heavily on Linux-based infrastructure such as finance, telecommunications, and public administration. While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the resulting instability could be exploited as part of a broader attack chain or cause operational disruptions. Given the widespread use of Linux in European data centers, cloud environments, and enterprise servers, unpatched systems may face increased risk of service outages. Additionally, organizations with strict uptime and availability requirements could experience reputational and financial damage if SMB services are interrupted. The lack of known exploits reduces immediate risk, but the vulnerability's presence in kernel-level code warrants prompt attention to avoid potential exploitation or accidental system failures.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is resolved. Since the root cause is the unnecessary mutex lock in ksmbd_durable_scavenger_alive(), applying the official kernel patch that removes this locking behavior is essential. Organizations should: 1) Identify all Linux systems running vulnerable kernel versions, focusing on those providing SMB services via ksmbd. 2) Schedule and perform kernel upgrades to the latest stable releases containing the fix. 3) Monitor kernel logs for warnings related to "do not call blocking ops when !TASK_RUNNING" as an indicator of potential exposure. 4) Implement robust testing in staging environments to verify that SMB services remain stable post-patch. 5) Consider temporary mitigation by limiting SMB service usage or isolating vulnerable hosts until patches are applied. 6) Engage with Linux distribution vendors for timely security advisories and patches. 7) Maintain comprehensive backup and recovery plans to mitigate potential service disruptions. These steps go beyond generic advice by focusing on kernel-level patching, targeted monitoring, and operational continuity planning specific to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.941Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd7081
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/3/2025, 11:27:09 PM
Last updated: 8/14/2025, 11:30:34 PM
Views: 20
Related Threats
CVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumCVE-2025-8361: CWE-962 Missing Authorization in Drupal Config Pages
HighCVE-2025-8092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.