CVE-2025-37987: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: pds_core: Prevent possible adminq overflow/stuck condition The pds_core's adminq is protected by the adminq_lock, which prevents more than 1 command to be posted onto it at any one time. This makes it so the client drivers cannot simultaneously post adminq commands. However, the completions happen in a different context, which means multiple adminq commands can be posted sequentially and all waiting on completion. On the FW side, the backing adminq request queue is only 16 entries long and the retry mechanism and/or overflow/stuck prevention is lacking. This can cause the adminq to get stuck, so commands are no longer processed and completions are no longer sent by the FW. As an initial fix, prevent more than 16 outstanding adminq commands so there's no way to cause the adminq from getting stuck. This works because the backing adminq request queue will never have more than 16 pending adminq commands, so it will never overflow. This is done by reducing the adminq depth to 16.
AI Analysis
Technical Summary
CVE-2025-37987 is a vulnerability identified in the Linux kernel specifically related to the pds_core component's adminq (administrative queue) handling. The adminq is designed to serialize commands to the firmware (FW) by using an adminq_lock to ensure that only one command is posted at a time by client drivers. However, completions for these commands occur asynchronously in a different context, allowing multiple commands to be posted sequentially and all to wait for completion simultaneously. The underlying firmware queue that backs the adminq has a fixed size of 16 entries and lacks robust retry or overflow prevention mechanisms. This design flaw can lead to an overflow or stuck condition in the adminq, where the queue becomes full and no further commands are processed, causing the firmware to stop sending completions. This effectively halts command processing, potentially leading to denial of service conditions. The initial mitigation implemented reduces the adminq depth to 16, ensuring that no more than 16 outstanding commands can be posted at once, thereby preventing overflow and the stuck condition. This fix addresses the immediate risk by aligning the software queue depth with the firmware queue capacity, but it may impact performance under heavy administrative command loads. No known exploits are currently reported in the wild, and the vulnerability was publicly disclosed in May 2025 without an assigned CVSS score.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable versions of the Linux kernel that include the affected pds_core component. The potential impact includes denial of service (DoS) conditions where administrative commands to the firmware are no longer processed, potentially degrading system stability and availability. This could affect critical infrastructure, cloud service providers, and enterprises relying on Linux-based servers and network devices. Given Linux's widespread use in European data centers, telecommunications, and industrial control systems, the vulnerability could disrupt operations if exploited or triggered inadvertently. While no active exploitation is known, the risk remains that attackers or malfunctioning software could cause system outages. The impact on confidentiality and integrity is limited, as the vulnerability primarily affects availability. However, prolonged DoS conditions could indirectly affect business continuity and service delivery, especially in sectors with stringent uptime requirements such as finance, healthcare, and public services.
Mitigation Recommendations
European organizations should promptly apply kernel updates that include the fix reducing the adminq depth to 16 to prevent overflow conditions. Beyond patching, administrators should monitor system logs and firmware communication channels for signs of adminq queue saturation or stuck conditions. Implementing proactive alerting on abnormal adminq command queue lengths or firmware response delays can help detect issues early. For environments with high administrative command loads, consider workload balancing or command rate limiting to avoid saturating the adminq. Additionally, organizations should validate firmware versions and ensure they are compatible with the patched kernel to prevent mismatches that could exacerbate the issue. In critical systems, testing patches in staging environments before deployment is recommended to assess performance impacts. Network segmentation and strict access controls can reduce the risk of unauthorized triggering of the vulnerability. Finally, maintain regular backups and incident response plans to mitigate potential service disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-37987: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: pds_core: Prevent possible adminq overflow/stuck condition The pds_core's adminq is protected by the adminq_lock, which prevents more than 1 command to be posted onto it at any one time. This makes it so the client drivers cannot simultaneously post adminq commands. However, the completions happen in a different context, which means multiple adminq commands can be posted sequentially and all waiting on completion. On the FW side, the backing adminq request queue is only 16 entries long and the retry mechanism and/or overflow/stuck prevention is lacking. This can cause the adminq to get stuck, so commands are no longer processed and completions are no longer sent by the FW. As an initial fix, prevent more than 16 outstanding adminq commands so there's no way to cause the adminq from getting stuck. This works because the backing adminq request queue will never have more than 16 pending adminq commands, so it will never overflow. This is done by reducing the adminq depth to 16.
AI-Powered Analysis
Technical Analysis
CVE-2025-37987 is a vulnerability identified in the Linux kernel specifically related to the pds_core component's adminq (administrative queue) handling. The adminq is designed to serialize commands to the firmware (FW) by using an adminq_lock to ensure that only one command is posted at a time by client drivers. However, completions for these commands occur asynchronously in a different context, allowing multiple commands to be posted sequentially and all to wait for completion simultaneously. The underlying firmware queue that backs the adminq has a fixed size of 16 entries and lacks robust retry or overflow prevention mechanisms. This design flaw can lead to an overflow or stuck condition in the adminq, where the queue becomes full and no further commands are processed, causing the firmware to stop sending completions. This effectively halts command processing, potentially leading to denial of service conditions. The initial mitigation implemented reduces the adminq depth to 16, ensuring that no more than 16 outstanding commands can be posted at once, thereby preventing overflow and the stuck condition. This fix addresses the immediate risk by aligning the software queue depth with the firmware queue capacity, but it may impact performance under heavy administrative command loads. No known exploits are currently reported in the wild, and the vulnerability was publicly disclosed in May 2025 without an assigned CVSS score.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable versions of the Linux kernel that include the affected pds_core component. The potential impact includes denial of service (DoS) conditions where administrative commands to the firmware are no longer processed, potentially degrading system stability and availability. This could affect critical infrastructure, cloud service providers, and enterprises relying on Linux-based servers and network devices. Given Linux's widespread use in European data centers, telecommunications, and industrial control systems, the vulnerability could disrupt operations if exploited or triggered inadvertently. While no active exploitation is known, the risk remains that attackers or malfunctioning software could cause system outages. The impact on confidentiality and integrity is limited, as the vulnerability primarily affects availability. However, prolonged DoS conditions could indirectly affect business continuity and service delivery, especially in sectors with stringent uptime requirements such as finance, healthcare, and public services.
Mitigation Recommendations
European organizations should promptly apply kernel updates that include the fix reducing the adminq depth to 16 to prevent overflow conditions. Beyond patching, administrators should monitor system logs and firmware communication channels for signs of adminq queue saturation or stuck conditions. Implementing proactive alerting on abnormal adminq command queue lengths or firmware response delays can help detect issues early. For environments with high administrative command loads, consider workload balancing or command rate limiting to avoid saturating the adminq. Additionally, organizations should validate firmware versions and ensure they are compatible with the patched kernel to prevent mismatches that could exacerbate the issue. In critical systems, testing patches in staging environments before deployment is recommended to assess performance impacts. Network segmentation and strict access controls can reduce the risk of unauthorized triggering of the vulnerability. Finally, maintain regular backups and incident response plans to mitigate potential service disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.976Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeadee
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/3/2025, 7:25:54 PM
Last updated: 7/30/2025, 11:56:15 PM
Views: 11
Related Threats
CVE-2025-8708: Deserialization in Antabot White-Jotter
LowCVE-2025-8707: Improper Export of Android Application Components in Huuge Box App
MediumCVE-2025-8706: SQL Injection in Wanzhou WOES Intelligent Optimization Energy Saving System
MediumCVE-2025-8705: SQL Injection in Wanzhou WOES Intelligent Optimization Energy Saving System
MediumCVE-2025-8704: SQL Injection in Wanzhou WOES Intelligent Optimization Energy Saving System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.