Kernel Scheduling Issue in Linux Affecting User Processes
CVE-2025-37880
Summary
A vulnerability in the Linux kernel affects the scheduling of user processes when using the sched_yield syscall in time-travel mode. This issue can lead to significant performance degradation or deadlock due to an improperly implemented userspace spinlock in ASAN, particularly when configurations such as CONFIG_UML_MAX_USERSPACE_ITERATIONS are set. To mitigate this issue, the kernel accounts time whenever a process executes the sched_yield syscall, ensuring more reliable scheduling behavior in affected environments.
Affected Version(s)
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 990ddc65173776f1e01e7135d8c1fd5f8fd4d5d2
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 887c5c12e80c8424bd471122d2e8b6b462e12874
References
Timeline
Vulnerability published
Vulnerability Reserved