Skip to main content

CVE-2025-37859: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-37859cvecve-2025-37859
Published: Fri May 09 2025 (05/09/2025, 06:42:06 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: page_pool: avoid infinite loop to schedule delayed worker We noticed the kworker in page_pool_release_retry() was waken up repeatedly and infinitely in production because of the buggy driver causing the inflight less than 0 and warning us in page_pool_inflight()[1]. Since the inflight value goes negative, it means we should not expect the whole page_pool to get back to work normally. This patch mitigates the adverse effect by not rescheduling the kworker when detecting the inflight negative in page_pool_release_retry(). [1] [Mon Feb 10 20:36:11 2025] ------------[ cut here ]------------ [Mon Feb 10 20:36:11 2025] Negative(-51446) inflight packet-pages ... [Mon Feb 10 20:36:11 2025] Call Trace: [Mon Feb 10 20:36:11 2025] page_pool_release_retry+0x23/0x70 [Mon Feb 10 20:36:11 2025] process_one_work+0x1b1/0x370 [Mon Feb 10 20:36:11 2025] worker_thread+0x37/0x3a0 [Mon Feb 10 20:36:11 2025] kthread+0x11a/0x140 [Mon Feb 10 20:36:11 2025] ? process_one_work+0x370/0x370 [Mon Feb 10 20:36:11 2025] ? __kthread_cancel_work+0x40/0x40 [Mon Feb 10 20:36:11 2025] ret_from_fork+0x35/0x40 [Mon Feb 10 20:36:11 2025] ---[ end trace ebffe800f33e7e34 ]--- Note: before this patch, the above calltrace would flood the dmesg due to repeated reschedule of release_dw kworker.

AI-Powered Analysis

AILast updated: 07/04/2025, 00:28:45 UTC

Technical Analysis

CVE-2025-37859 is a vulnerability identified in the Linux kernel's page_pool subsystem, specifically related to the handling of delayed worker scheduling in the page_pool_release_retry() function. The issue arises when a buggy driver causes the 'inflight' counter, which tracks the number of packet-pages currently in use, to become negative. This negative inflight value is an abnormal state indicating a logic error in resource accounting. Due to this, the kernel's worker thread (kworker) responsible for releasing page pool resources is repeatedly and infinitely rescheduled, causing an infinite loop. This results in excessive CPU usage and flooding of kernel logs (dmesg) with warning messages and call traces, which can degrade system performance and stability. The patch introduced mitigates the problem by preventing the rescheduling of the kworker when a negative inflight value is detected, thus avoiding the infinite loop and associated resource exhaustion. The vulnerability is rooted in kernel resource management and is triggered by faulty drivers that mishandle packet-page accounting, leading to system instability. No CVSS score has been assigned yet, and there are no known exploits in the wild as of the publication date.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with drivers that could trigger the negative inflight condition. The impact includes potential denial of service due to high CPU consumption by the infinite kworker loop and log flooding, which can obscure other critical system messages and complicate troubleshooting. This can affect servers, network appliances, and embedded devices relying on Linux, potentially disrupting business operations, especially in sectors with high availability requirements such as finance, telecommunications, and critical infrastructure. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact can be significant, leading to service outages or degraded performance. Organizations using custom or third-party drivers should be particularly vigilant, as buggy drivers are the root cause. The lack of known exploits reduces immediate risk, but the vulnerability's nature means that exploitation could be achieved by local attackers or automated processes triggering the faulty driver behavior.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2025-37859 as soon as they become available. In the interim, auditing and validating all third-party and custom kernel drivers for correctness in resource accounting is critical to prevent triggering the negative inflight condition. System administrators should monitor kernel logs for signs of repeated page_pool warnings or kworker rescheduling loops to detect potential exploitation or triggering of this vulnerability. Implementing kernel live patching where possible can reduce downtime during remediation. Additionally, organizations should enforce strict driver vetting policies and consider isolating or sandboxing untrusted drivers to limit impact. For critical systems, deploying monitoring tools that track CPU usage spikes and kernel worker thread behavior can provide early warning signs. Finally, maintaining robust backup and recovery procedures will help mitigate the impact of any availability disruptions caused by this issue.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.957Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7cef

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/4/2025, 12:28:45 AM

Last updated: 8/13/2025, 9:17:38 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats