Skip to main content

CVE-2025-37987: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-37987cvecve-2025-37987
Published: Tue May 20 2025 (05/20/2025, 17:09:20 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: pds_core: Prevent possible adminq overflow/stuck condition The pds_core's adminq is protected by the adminq_lock, which prevents more than 1 command to be posted onto it at any one time. This makes it so the client drivers cannot simultaneously post adminq commands. However, the completions happen in a different context, which means multiple adminq commands can be posted sequentially and all waiting on completion. On the FW side, the backing adminq request queue is only 16 entries long and the retry mechanism and/or overflow/stuck prevention is lacking. This can cause the adminq to get stuck, so commands are no longer processed and completions are no longer sent by the FW. As an initial fix, prevent more than 16 outstanding adminq commands so there's no way to cause the adminq from getting stuck. This works because the backing adminq request queue will never have more than 16 pending adminq commands, so it will never overflow. This is done by reducing the adminq depth to 16.

AI-Powered Analysis

AILast updated: 07/03/2025, 19:25:54 UTC

Technical Analysis

CVE-2025-37987 is a vulnerability identified in the Linux kernel specifically related to the pds_core component's adminq (administrative queue) handling. The adminq is designed to serialize commands to the firmware (FW) by using an adminq_lock to ensure that only one command is posted at a time by client drivers. However, completions for these commands occur asynchronously in a different context, allowing multiple commands to be posted sequentially and all to wait for completion simultaneously. The underlying firmware queue that backs the adminq has a fixed size of 16 entries and lacks robust retry or overflow prevention mechanisms. This design flaw can lead to an overflow or stuck condition in the adminq, where the queue becomes full and no further commands are processed, causing the firmware to stop sending completions. This effectively halts command processing, potentially leading to denial of service conditions. The initial mitigation implemented reduces the adminq depth to 16, ensuring that no more than 16 outstanding commands can be posted at once, thereby preventing overflow and the stuck condition. This fix addresses the immediate risk by aligning the software queue depth with the firmware queue capacity, but it may impact performance under heavy administrative command loads. No known exploits are currently reported in the wild, and the vulnerability was publicly disclosed in May 2025 without an assigned CVSS score.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable versions of the Linux kernel that include the affected pds_core component. The potential impact includes denial of service (DoS) conditions where administrative commands to the firmware are no longer processed, potentially degrading system stability and availability. This could affect critical infrastructure, cloud service providers, and enterprises relying on Linux-based servers and network devices. Given Linux's widespread use in European data centers, telecommunications, and industrial control systems, the vulnerability could disrupt operations if exploited or triggered inadvertently. While no active exploitation is known, the risk remains that attackers or malfunctioning software could cause system outages. The impact on confidentiality and integrity is limited, as the vulnerability primarily affects availability. However, prolonged DoS conditions could indirectly affect business continuity and service delivery, especially in sectors with stringent uptime requirements such as finance, healthcare, and public services.

Mitigation Recommendations

European organizations should promptly apply kernel updates that include the fix reducing the adminq depth to 16 to prevent overflow conditions. Beyond patching, administrators should monitor system logs and firmware communication channels for signs of adminq queue saturation or stuck conditions. Implementing proactive alerting on abnormal adminq command queue lengths or firmware response delays can help detect issues early. For environments with high administrative command loads, consider workload balancing or command rate limiting to avoid saturating the adminq. Additionally, organizations should validate firmware versions and ensure they are compatible with the patched kernel to prevent mismatches that could exacerbate the issue. In critical systems, testing patches in staging environments before deployment is recommended to assess performance impacts. Network segmentation and strict access controls can reduce the risk of unauthorized triggering of the vulnerability. Finally, maintain regular backups and incident response plans to mitigate potential service disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.976Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeadee

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/3/2025, 7:25:54 PM

Last updated: 7/30/2025, 11:56:15 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats