Metrics
Affected Vendors & Products
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 17 Jun 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 06 Jun 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 27 May 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 20 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: ftrace: Add cond_resched() to ftrace_graph_set_hash() When the kernel contains a large number of functions that can be traced, the loop in ftrace_graph_set_hash() may take a lot of time to execute. This may trigger the softlockup watchdog. Add cond_resched() within the loop to allow the kernel to remain responsive even when processing a large number of functions. This matches the cond_resched() that is used in other locations of the code that iterates over all functions that can be traced. | |
| Title | ftrace: Add cond_resched() to ftrace_graph_set_hash() | |
| References |
|
|
Status: PUBLISHED
Assigner: Linux
Published: 2025-05-20T15:58:17.634Z
Updated: 2025-11-03T19:57:35.970Z
Reserved: 2025-04-16T04:51:23.971Z
Link: CVE-2025-37940
No data.
Status : Awaiting Analysis
Published: 2025-05-20T16:15:31.737
Modified: 2025-11-03T20:18:42.727
Link: CVE-2025-37940