CVE-2025-21728
27.02.2025, 02:15
In the Linux kernel, the following vulnerability has been resolved: bpf: Send signals asynchronously if !preemptible BPF programs can execute in all kinds of contexts and when a program running in a non-preemptible context uses the bpf_send_signal() kfunc, it will cause issues because this kfunc can sleep. Change `irqs_disabled()` to `!preemptible()`.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 5.4.33 ≤ 𝑥 < 5.4.291 |
| linux | linux_kernel | 5.5.18 ≤ 𝑥 < 5.6 |
| linux | linux_kernel | 5.6.1 ≤ 𝑥 < 5.10.235 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.179 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.129 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.76 |
| linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.13 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.13.2 |
| linux | linux_kernel | 5.6 |
𝑥
= Vulnerable software versions
Debian Releases
References