๐Ÿ” CVE Alert

CVE-2025-37880

UNKNOWN 0.0

um: work around sched_yield not yielding in time-travel mode

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: um: work around sched_yield not yielding in time-travel mode sched_yield by a userspace may not actually cause scheduling in time-travel mode as no time has passed. In the case seen it appears to be a badly implemented userspace spinlock in ASAN. Unfortunately, with time-travel it causes an extreme slowdown or even deadlock depending on the kernel configuration (CONFIG_UML_MAX_USERSPACE_ITERATIONS). Work around it by accounting time to the process whenever it executes a sched_yield syscall.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 9, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
065038706f77a56754e8f0c2556dab7e22dfe577 < 990ddc65173776f1e01e7135d8c1fd5f8fd4d5d2 065038706f77a56754e8f0c2556dab7e22dfe577 < 887c5c12e80c8424bd471122d2e8b6b462e12874
Linux / Linux
5.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/990ddc65173776f1e01e7135d8c1fd5f8fd4d5d2 git.kernel.org: https://git.kernel.org/stable/c/887c5c12e80c8424bd471122d2e8b6b462e12874