BPF Signal Handling Issue in Linux Kernel
CVE-2025-21728
Currently unrated
Summary
In the Linux kernel, a noteworthy vulnerability arose from the use of the bpf_send_signal() function within non-preemptible contexts. This function can cause issues as it may enter a sleep state, which is problematic in such execution contexts. The kernel has been updated to replace the irqs_disabled()
condition with !preemptible()
, addressing this potential disruption in signal handling for BPF programs.
Affected Version(s)
Linux 1bc7896e9ef44fd77858b3ef0b8a6840be3a4494
Linux 1bc7896e9ef44fd77858b3ef0b8a6840be3a4494
Linux 1bc7896e9ef44fd77858b3ef0b8a6840be3a4494 < 78b97783496b454435639937db3303e900a24d3f
References
Timeline
Vulnerability published
Vulnerability Reserved