CVE-2025-37859: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: page_pool: avoid infinite loop to schedule delayed worker We noticed the kworker in page_pool_release_retry() was waken up repeatedly and infinitely in production because of the buggy driver causing the inflight less than 0 and warning us in page_pool_inflight()[1]. Since the inflight value goes negative, it means we should not expect the whole page_pool to get back to work normally. This patch mitigates the adverse effect by not rescheduling the kworker when detecting the inflight negative in page_pool_release_retry(). [1] [Mon Feb 10 20:36:11 2025] ------------[ cut here ]------------ [Mon Feb 10 20:36:11 2025] Negative(-51446) inflight packet-pages ... [Mon Feb 10 20:36:11 2025] Call Trace: [Mon Feb 10 20:36:11 2025] page_pool_release_retry+0x23/0x70 [Mon Feb 10 20:36:11 2025] process_one_work+0x1b1/0x370 [Mon Feb 10 20:36:11 2025] worker_thread+0x37/0x3a0 [Mon Feb 10 20:36:11 2025] kthread+0x11a/0x140 [Mon Feb 10 20:36:11 2025] ? process_one_work+0x370/0x370 [Mon Feb 10 20:36:11 2025] ? __kthread_cancel_work+0x40/0x40 [Mon Feb 10 20:36:11 2025] ret_from_fork+0x35/0x40 [Mon Feb 10 20:36:11 2025] ---[ end trace ebffe800f33e7e34 ]--- Note: before this patch, the above calltrace would flood the dmesg due to repeated reschedule of release_dw kworker.
AI Analysis
Technical Summary
CVE-2025-37859 is a vulnerability identified in the Linux kernel's page_pool subsystem, specifically related to the handling of delayed worker scheduling in the page_pool_release_retry() function. The issue arises when a buggy driver causes the 'inflight' counter, which tracks the number of packet-pages currently in use, to become negative. This negative inflight value is an abnormal state indicating a logic error in resource accounting. Due to this, the kernel's worker thread (kworker) responsible for releasing page pool resources is repeatedly and infinitely rescheduled, causing an infinite loop. This results in excessive CPU usage and flooding of kernel logs (dmesg) with warning messages and call traces, which can degrade system performance and stability. The patch introduced mitigates the problem by preventing the rescheduling of the kworker when a negative inflight value is detected, thus avoiding the infinite loop and associated resource exhaustion. The vulnerability is rooted in kernel resource management and is triggered by faulty drivers that mishandle packet-page accounting, leading to system instability. No CVSS score has been assigned yet, and there are no known exploits in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with drivers that could trigger the negative inflight condition. The impact includes potential denial of service due to high CPU consumption by the infinite kworker loop and log flooding, which can obscure other critical system messages and complicate troubleshooting. This can affect servers, network appliances, and embedded devices relying on Linux, potentially disrupting business operations, especially in sectors with high availability requirements such as finance, telecommunications, and critical infrastructure. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact can be significant, leading to service outages or degraded performance. Organizations using custom or third-party drivers should be particularly vigilant, as buggy drivers are the root cause. The lack of known exploits reduces immediate risk, but the vulnerability's nature means that exploitation could be achieved by local attackers or automated processes triggering the faulty driver behavior.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2025-37859 as soon as they become available. In the interim, auditing and validating all third-party and custom kernel drivers for correctness in resource accounting is critical to prevent triggering the negative inflight condition. System administrators should monitor kernel logs for signs of repeated page_pool warnings or kworker rescheduling loops to detect potential exploitation or triggering of this vulnerability. Implementing kernel live patching where possible can reduce downtime during remediation. Additionally, organizations should enforce strict driver vetting policies and consider isolating or sandboxing untrusted drivers to limit impact. For critical systems, deploying monitoring tools that track CPU usage spikes and kernel worker thread behavior can provide early warning signs. Finally, maintaining robust backup and recovery procedures will help mitigate the impact of any availability disruptions caused by this issue.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-37859: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: page_pool: avoid infinite loop to schedule delayed worker We noticed the kworker in page_pool_release_retry() was waken up repeatedly and infinitely in production because of the buggy driver causing the inflight less than 0 and warning us in page_pool_inflight()[1]. Since the inflight value goes negative, it means we should not expect the whole page_pool to get back to work normally. This patch mitigates the adverse effect by not rescheduling the kworker when detecting the inflight negative in page_pool_release_retry(). [1] [Mon Feb 10 20:36:11 2025] ------------[ cut here ]------------ [Mon Feb 10 20:36:11 2025] Negative(-51446) inflight packet-pages ... [Mon Feb 10 20:36:11 2025] Call Trace: [Mon Feb 10 20:36:11 2025] page_pool_release_retry+0x23/0x70 [Mon Feb 10 20:36:11 2025] process_one_work+0x1b1/0x370 [Mon Feb 10 20:36:11 2025] worker_thread+0x37/0x3a0 [Mon Feb 10 20:36:11 2025] kthread+0x11a/0x140 [Mon Feb 10 20:36:11 2025] ? process_one_work+0x370/0x370 [Mon Feb 10 20:36:11 2025] ? __kthread_cancel_work+0x40/0x40 [Mon Feb 10 20:36:11 2025] ret_from_fork+0x35/0x40 [Mon Feb 10 20:36:11 2025] ---[ end trace ebffe800f33e7e34 ]--- Note: before this patch, the above calltrace would flood the dmesg due to repeated reschedule of release_dw kworker.
AI-Powered Analysis
Technical Analysis
CVE-2025-37859 is a vulnerability identified in the Linux kernel's page_pool subsystem, specifically related to the handling of delayed worker scheduling in the page_pool_release_retry() function. The issue arises when a buggy driver causes the 'inflight' counter, which tracks the number of packet-pages currently in use, to become negative. This negative inflight value is an abnormal state indicating a logic error in resource accounting. Due to this, the kernel's worker thread (kworker) responsible for releasing page pool resources is repeatedly and infinitely rescheduled, causing an infinite loop. This results in excessive CPU usage and flooding of kernel logs (dmesg) with warning messages and call traces, which can degrade system performance and stability. The patch introduced mitigates the problem by preventing the rescheduling of the kworker when a negative inflight value is detected, thus avoiding the infinite loop and associated resource exhaustion. The vulnerability is rooted in kernel resource management and is triggered by faulty drivers that mishandle packet-page accounting, leading to system instability. No CVSS score has been assigned yet, and there are no known exploits in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with drivers that could trigger the negative inflight condition. The impact includes potential denial of service due to high CPU consumption by the infinite kworker loop and log flooding, which can obscure other critical system messages and complicate troubleshooting. This can affect servers, network appliances, and embedded devices relying on Linux, potentially disrupting business operations, especially in sectors with high availability requirements such as finance, telecommunications, and critical infrastructure. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact can be significant, leading to service outages or degraded performance. Organizations using custom or third-party drivers should be particularly vigilant, as buggy drivers are the root cause. The lack of known exploits reduces immediate risk, but the vulnerability's nature means that exploitation could be achieved by local attackers or automated processes triggering the faulty driver behavior.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2025-37859 as soon as they become available. In the interim, auditing and validating all third-party and custom kernel drivers for correctness in resource accounting is critical to prevent triggering the negative inflight condition. System administrators should monitor kernel logs for signs of repeated page_pool warnings or kworker rescheduling loops to detect potential exploitation or triggering of this vulnerability. Implementing kernel live patching where possible can reduce downtime during remediation. Additionally, organizations should enforce strict driver vetting policies and consider isolating or sandboxing untrusted drivers to limit impact. For critical systems, deploying monitoring tools that track CPU usage spikes and kernel worker thread behavior can provide early warning signs. Finally, maintaining robust backup and recovery procedures will help mitigate the impact of any availability disruptions caused by this issue.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.957Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd7cef
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/4/2025, 12:28:45 AM
Last updated: 8/13/2025, 9:17:38 AM
Views: 18
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.