{"id":"CVE-2025-21728","summary":"bpf: Send signals asynchronously if !preemptible","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Send signals asynchronously if !preemptible\n\nBPF programs can execute in all kinds of contexts and when a program\nrunning in a non-preemptible context uses the bpf_send_signal() kfunc,\nit will cause issues because this kfunc can sleep.\nChange `irqs_disabled()` to `!preemptible()`.","modified":"2026-04-02T12:45:12.145087Z","published":"2025-02-27T02:07:34.114Z","related":["ALSA-2025:20518","SUSE-SU-2025:01919-1","SUSE-SU-2025:0847-1","SUSE-SU-2025:0856-1","SUSE-SU-2025:0955-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","USN-7521-2"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21728.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/092fc76b7ab4163e008f9cde596a58dad2108260"},{"type":"WEB","url":"https://git.kernel.org/stable/c/78b97783496b454435639937db3303e900a24d3f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/87c544108b612512b254c8f79aa5c0a8546e2cc4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/be42a09fe898635b0093c0c8dac1bfabe225c240"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ce51eab2070e295d298f42a2f1db269cd1b56d55"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e306eaaa3d78b462db5f5b11e0171f9d2b6ca3f4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eeef8e65041a031bd8a747a392c14b76a123a12c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/feba1308bc5e8e04cee751d39fae8a9b407a9034"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21728.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21728"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"fd29a0242f86b2d95ad666aa9f92a3d0f7bfdab6"},{"fixed":"feba1308bc5e8e04cee751d39fae8a9b407a9034"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1bc7896e9ef44fd77858b3ef0b8a6840be3a4494"},{"fixed":"ce51eab2070e295d298f42a2f1db269cd1b56d55"},{"fixed":"e306eaaa3d78b462db5f5b11e0171f9d2b6ca3f4"},{"fixed":"be42a09fe898635b0093c0c8dac1bfabe225c240"},{"fixed":"eeef8e65041a031bd8a747a392c14b76a123a12c"},{"fixed":"78b97783496b454435639937db3303e900a24d3f"},{"fixed":"092fc76b7ab4163e008f9cde596a58dad2108260"},{"fixed":"87c544108b612512b254c8f79aa5c0a8546e2cc4"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"7930d01afb7281edd9782971e0cca6fe587c7a7b"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21728.json"}}],"schema_version":"1.7.5"}