Metrics
Affected Vendors & Products
Tue, 17 Jun 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 06 Jun 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 27 May 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 20 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ftrace: Add cond_resched() to ftrace_graph_set_hash() When the kernel contains a large number of functions that can be traced, the loop in ftrace_graph_set_hash() may take a lot of time to execute. This may trigger the softlockup watchdog. Add cond_resched() within the loop to allow the kernel to remain responsive even when processing a large number of functions. This matches the cond_resched() that is used in other locations of the code that iterates over all functions that can be traced. | |
Title | ftrace: Add cond_resched() to ftrace_graph_set_hash() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-26T05:24:10.234Z
Reserved: 2025-04-16T04:51:23.971Z
Link: CVE-2025-37940

No data.

Status : Awaiting Analysis
Published: 2025-05-20T16:15:31.737
Modified: 2025-05-21T20:25:16.407
Link: CVE-2025-37940
