In the Linux kernel, the following vulnerability has been resolved:
bpf: Send signals asynchronously if !preemptible
BPF programs can execute in all kinds of contexts and when a program
running in a non-preemptible context uses the bpf_send_signal() kfunc,
it will cause issues because this kfunc can sleep.
Change `irqs_disabled()` to `!preemptible()`.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-20 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 13 Mar 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 28 Feb 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 27 Feb 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: bpf: Send signals asynchronously if !preemptible BPF programs can execute in all kinds of contexts and when a program running in a non-preemptible context uses the bpf_send_signal() kfunc, it will cause issues because this kfunc can sleep. Change `irqs_disabled()` to `!preemptible()`. | |
Title | bpf: Send signals asynchronously if !preemptible | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-27T02:07:34.114Z
Updated: 2025-05-04T13:06:28.428Z
Reserved: 2024-12-29T08:45:45.755Z
Link: CVE-2025-21728

No data.

Status : Awaiting Analysis
Published: 2025-02-27T02:15:16.530
Modified: 2025-03-13T13:15:50.850
Link: CVE-2025-21728
