In the Linux kernel, the following vulnerability has been resolved:
ftrace: Add cond_resched() to ftrace_graph_set_hash()
When the kernel contains a large number of functions that can be traced,
the loop in ftrace_graph_set_hash() may take a lot of time to execute.
This may trigger the softlockup watchdog.
Add cond_resched() within the loop to allow the kernel to remain
responsive even when processing a large number of functions.
This matches the cond_resched() that is used in other locations of the
code that iterates over all functions that can be traced.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
19 Dec 2025, 17:44
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CWE | CWE-667 | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/1fce9574b9d515bcb8a75379a8053e18602424e3 - Patch | |
| References | () https://git.kernel.org/stable/c/42ea22e754ba4f2b86f8760ca27f6f71da2d982c - Patch | |
| References | () https://git.kernel.org/stable/c/4429535acab750d963fdc3dfcc9e0eee42f4d599 - Patch | |
| References | () https://git.kernel.org/stable/c/5d336ac215e5c76e43ef4bca9ba699835e53e2fd - Patch | |
| References | () https://git.kernel.org/stable/c/618655d54c5f8af5d57b77491d08c0f0ff77d114 - Patch | |
| References | () https://git.kernel.org/stable/c/72be43ff061a889c6ee648a330a42486cafa15a6 - Patch | |
| References | () https://git.kernel.org/stable/c/8dd7d7280357596ba63dfdb4c1725d9dd24bd42a - Patch | |
| References | () https://git.kernel.org/stable/c/dd38803c9088b848c6b56f4f6d7efc4497bfde61 - Patch | |
| References | () https://git.kernel.org/stable/c/e5b4ae6f01d4a510d5725eca7254519a1093920d - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Third Party Advisory |
03 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
20 May 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-20 16:15
Updated : 2025-12-19 17:44
NVD link : CVE-2025-37940
Mitre link : CVE-2025-37940
CVE.ORG link : CVE-2025-37940
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-667
Improper Locking
