๐Ÿ” CVE Alert

CVE-2025-21690

MEDIUM 5.5

scsi: storvsc: Ratelimit warning logs to prevent VM denial of service

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service If there's a persistent error in the hypervisor, the SCSI warning for failed I/O can flood the kernel log and max out CPU utilization, preventing troubleshooting from the VM side. Ratelimit the warning so it doesn't DoS the VM.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 10, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f8aea701b77c26732f151aab4f0a70e62eb53d86 < 81d4dd05c412ba04f9f6b85b718e6da833be290c f8aea701b77c26732f151aab4f0a70e62eb53d86 < 182a4b7c731e95c08cb47f14b87a272b6ab2b2da f8aea701b77c26732f151aab4f0a70e62eb53d86 < 088bde862f8d3d0fc52e40e66a0484a246837087 f8aea701b77c26732f151aab4f0a70e62eb53d86 < 01d1ebdab9ccb73c952e1666a8a80abd194dbc55 f8aea701b77c26732f151aab4f0a70e62eb53d86 < d0f0af1bafef33b3e2aa8c3a4ef44db48df9b0ea f8aea701b77c26732f151aab4f0a70e62eb53d86 < d2138eab8cde61e0e6f62d0713e45202e8457d6d
Linux / Linux
4.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/81d4dd05c412ba04f9f6b85b718e6da833be290c git.kernel.org: https://git.kernel.org/stable/c/182a4b7c731e95c08cb47f14b87a272b6ab2b2da git.kernel.org: https://git.kernel.org/stable/c/088bde862f8d3d0fc52e40e66a0484a246837087 git.kernel.org: https://git.kernel.org/stable/c/01d1ebdab9ccb73c952e1666a8a80abd194dbc55 git.kernel.org: https://git.kernel.org/stable/c/d0f0af1bafef33b3e2aa8c3a4ef44db48df9b0ea git.kernel.org: https://git.kernel.org/stable/c/d2138eab8cde61e0e6f62d0713e45202e8457d6d lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html