๐Ÿ” CVE Alert

CVE-2025-21694

MEDIUM 5.5

fs/proc: fix softlockup in __read_vmcore (part 2)

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix softlockup in __read_vmcore (part 2) Since commit 5cbcb62dddf5 ("fs/proc: fix softlockup in __read_vmcore") the number of softlockups in __read_vmcore at kdump time have gone down, but they still happen sometimes. In a memory constrained environment like the kdump image, a softlockup is not just a harmless message, but it can interfere with things like RCU freeing memory, causing the crashdump to get stuck. The second loop in __read_vmcore has a lot more opportunities for natural sleep points, like scheduling out while waiting for a data write to happen, but apparently that is not always enough. Add a cond_resched() to the second loop in __read_vmcore to (hopefully) get rid of the softlockups.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 12, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
803d5a33d5ffdc2d86dcc0cfa01655a330612cdb < 84c4ed15626574c9ac6c1039ba9c137a77bcc7f2 70c1835e776c8447c1aca87ddb38cfe764fe756a < 80da29deb88a3a907441fc35bb7bac309f31e713 e1b160a50c756e0efbea290b9bf5117cb80e8c4b < 649b266606bc413407ce315f710c8ce8a88ee30a a373ad833a6bfe4bc6cedcf7e56a99cc6fd9a193 < 65c367bd9d4f43513c7f837df5753bea9561b836 518fbd644dabb6aedbdd4939c6c9cc1bf651459f < a5a2ee8144c3897d37403a69118c3e3dc5713958 5cbcb62dddf5346077feb82b7b0c9254222d3445 < 80828540dad0757b6337c6561d49c81038f38d87 5cbcb62dddf5346077feb82b7b0c9254222d3445 < cbc5dde0a461240046e8a41c43d7c3b76d5db952 7bdf1d550ddfcd9ab797087421f77b7aceddc8a7 e8780e8a0e25dc4c3927f611ec8970d26c0c7369
Linux / Linux
6.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/84c4ed15626574c9ac6c1039ba9c137a77bcc7f2 git.kernel.org: https://git.kernel.org/stable/c/80da29deb88a3a907441fc35bb7bac309f31e713 git.kernel.org: https://git.kernel.org/stable/c/649b266606bc413407ce315f710c8ce8a88ee30a git.kernel.org: https://git.kernel.org/stable/c/65c367bd9d4f43513c7f837df5753bea9561b836 git.kernel.org: https://git.kernel.org/stable/c/a5a2ee8144c3897d37403a69118c3e3dc5713958 git.kernel.org: https://git.kernel.org/stable/c/80828540dad0757b6337c6561d49c81038f38d87 git.kernel.org: https://git.kernel.org/stable/c/cbc5dde0a461240046e8a41c43d7c3b76d5db952 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-398330.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html