CVE-2025-37940

In the Linux kernel, the following vulnerability has been resolved: ftrace: Add cond_resched() to ftrace_graph_set_hash() When the kernel contains a large number of functions that can be traced, the loop in ftrace_graph_set_hash() may take a lot of time to execute. This may trigger the softlockup watchdog. Add cond_resched() within the loop to allow the kernel to remain responsive even when processing a large number of functions. This matches the cond_resched() that is used in other locations of the code that iterates over all functions that can be traced.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

19 Dec 2025, 17:44

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-667
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1fce9574b9d515bcb8a75379a8053e18602424e3 - () https://git.kernel.org/stable/c/1fce9574b9d515bcb8a75379a8053e18602424e3 - Patch
References () https://git.kernel.org/stable/c/42ea22e754ba4f2b86f8760ca27f6f71da2d982c - () https://git.kernel.org/stable/c/42ea22e754ba4f2b86f8760ca27f6f71da2d982c - Patch
References () https://git.kernel.org/stable/c/4429535acab750d963fdc3dfcc9e0eee42f4d599 - () https://git.kernel.org/stable/c/4429535acab750d963fdc3dfcc9e0eee42f4d599 - Patch
References () https://git.kernel.org/stable/c/5d336ac215e5c76e43ef4bca9ba699835e53e2fd - () https://git.kernel.org/stable/c/5d336ac215e5c76e43ef4bca9ba699835e53e2fd - Patch
References () https://git.kernel.org/stable/c/618655d54c5f8af5d57b77491d08c0f0ff77d114 - () https://git.kernel.org/stable/c/618655d54c5f8af5d57b77491d08c0f0ff77d114 - Patch
References () https://git.kernel.org/stable/c/72be43ff061a889c6ee648a330a42486cafa15a6 - () https://git.kernel.org/stable/c/72be43ff061a889c6ee648a330a42486cafa15a6 - Patch
References () https://git.kernel.org/stable/c/8dd7d7280357596ba63dfdb4c1725d9dd24bd42a - () https://git.kernel.org/stable/c/8dd7d7280357596ba63dfdb4c1725d9dd24bd42a - Patch
References () https://git.kernel.org/stable/c/dd38803c9088b848c6b56f4f6d7efc4497bfde61 - () https://git.kernel.org/stable/c/dd38803c9088b848c6b56f4f6d7efc4497bfde61 - Patch
References () https://git.kernel.org/stable/c/e5b4ae6f01d4a510d5725eca7254519a1093920d - () https://git.kernel.org/stable/c/e5b4ae6f01d4a510d5725eca7254519a1093920d - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Third Party Advisory

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ftrace: Añadir cond_resched() a ftrace_graph_set_hash(). Cuando el kernel contiene una gran cantidad de funciones rastreables, el bucle en ftrace_graph_set_hash() puede tardar mucho en ejecutarse. Esto puede activar el mecanismo de vigilancia de bloqueo suave. Añadir cond_resched() dentro del bucle para que el kernel siga respondiendo incluso al procesar una gran cantidad de funciones. Esto coincide con el cond_resched() utilizado en otras partes del código que itera sobre todas las funciones rastreables.

20 May 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-20 16:15

Updated : 2025-12-19 17:44


NVD link : CVE-2025-37940

Mitre link : CVE-2025-37940

CVE.ORG link : CVE-2025-37940


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-667

Improper Locking