In the Linux kernel, the following vulnerability has been resolved:
scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
If there's a persistent error in the hypervisor, the SCSI warning for failed I/O can flood the kernel log and max out CPU utilization, preventing troubleshooting from the VM side. Ratelimit the warning so it doesn't DoS the VM.
[
{
"target": {
"file": "drivers/scsi/storvsc_drv.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"202854777622143087437072652647260830843",
"186608798660034566645943523086767780847",
"235140063723721016381104744813747191214",
"326807584113673022344234973929941133330",
"325437351963112570510026417710652602409",
"3859668118179586393393832135497072160",
"222530286503105464909575114467705045213"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@088bde862f8d3d0fc52e40e66a0484a246837087",
"deprecated": false,
"id": "CVE-2025-21690-3a256d6f",
"signature_type": "Line"
},
{
"target": {
"file": "drivers/scsi/storvsc_drv.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"202854777622143087437072652647260830843",
"186608798660034566645943523086767780847",
"235140063723721016381104744813747191214",
"326807584113673022344234973929941133330",
"325437351963112570510026417710652602409",
"3859668118179586393393832135497072160",
"222530286503105464909575114467705045213"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@01d1ebdab9ccb73c952e1666a8a80abd194dbc55",
"deprecated": false,
"id": "CVE-2025-21690-b6902584",
"signature_type": "Line"
},
{
"target": {
"file": "drivers/scsi/storvsc_drv.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"144591794225457586133956257762096040380",
"246360738896699778905860666580244738402",
"127806591339702038651465528220286268824",
"326807584113673022344234973929941133330",
"325437351963112570510026417710652602409",
"3859668118179586393393832135497072160",
"222530286503105464909575114467705045213"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@81d4dd05c412ba04f9f6b85b718e6da833be290c",
"deprecated": false,
"id": "CVE-2025-21690-bb6afa32",
"signature_type": "Line"
}
]