{"id":"CVE-2025-21694","summary":"fs/proc: fix softlockup in __read_vmcore (part 2)","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/proc: fix softlockup in __read_vmcore (part 2)\n\nSince commit 5cbcb62dddf5 (\"fs/proc: fix softlockup in __read_vmcore\") the\nnumber of softlockups in __read_vmcore at kdump time have gone down, but\nthey still happen sometimes.\n\nIn a memory constrained environment like the kdump image, a softlockup is\nnot just a harmless message, but it can interfere with things like RCU\nfreeing memory, causing the crashdump to get stuck.\n\nThe second loop in __read_vmcore has a lot more opportunities for natural\nsleep points, like scheduling out while waiting for a data write to\nhappen, but apparently that is not always enough.\n\nAdd a cond_resched() to the second loop in __read_vmcore to (hopefully)\nget rid of the softlockups.","modified":"2026-03-20T12:41:07.312465Z","published":"2025-02-12T13:27:53.763Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21694.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/649b266606bc413407ce315f710c8ce8a88ee30a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/65c367bd9d4f43513c7f837df5753bea9561b836"},{"type":"WEB","url":"https://git.kernel.org/stable/c/80828540dad0757b6337c6561d49c81038f38d87"},{"type":"WEB","url":"https://git.kernel.org/stable/c/80da29deb88a3a907441fc35bb7bac309f31e713"},{"type":"WEB","url":"https://git.kernel.org/stable/c/84c4ed15626574c9ac6c1039ba9c137a77bcc7f2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a5a2ee8144c3897d37403a69118c3e3dc5713958"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cbc5dde0a461240046e8a41c43d7c3b76d5db952"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21694.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21694"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"803d5a33d5ffdc2d86dcc0cfa01655a330612cdb"},{"fixed":"84c4ed15626574c9ac6c1039ba9c137a77bcc7f2"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"70c1835e776c8447c1aca87ddb38cfe764fe756a"},{"fixed":"80da29deb88a3a907441fc35bb7bac309f31e713"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e1b160a50c756e0efbea290b9bf5117cb80e8c4b"},{"fixed":"649b266606bc413407ce315f710c8ce8a88ee30a"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a373ad833a6bfe4bc6cedcf7e56a99cc6fd9a193"},{"fixed":"65c367bd9d4f43513c7f837df5753bea9561b836"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"518fbd644dabb6aedbdd4939c6c9cc1bf651459f"},{"fixed":"a5a2ee8144c3897d37403a69118c3e3dc5713958"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"5cbcb62dddf5346077feb82b7b0c9254222d3445"},{"fixed":"80828540dad0757b6337c6561d49c81038f38d87"},{"fixed":"cbc5dde0a461240046e8a41c43d7c3b76d5db952"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"7bdf1d550ddfcd9ab797087421f77b7aceddc8a7"},{"last_affected":"e8780e8a0e25dc4c3927f611ec8970d26c0c7369"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21694.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}