First published: Mon Jan 20 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period io_eventfd_do_signal() is invoked from an RCU callback, but when dropping the reference to the io_ev_fd, it calls io_eventfd_free() directly if the refcount drops to zero. This isn't correct, as any potential freeing of the io_ev_fd should be deferred another RCU grace period. Just call io_eventfd_put() rather than open-code the dec-and-test and free, which will correctly defer it another RCU grace period.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21655 has been rated as having a low severity due to its specific nature and limited impact.
To fix CVE-2025-21655, update your Linux kernel to the latest stable version where this vulnerability is addressed.
CVE-2025-21655 affects the Linux kernel across various distributions that utilize the io_uring subsystem.
As of the latest information, there have been no reports indicating active exploitation of CVE-2025-21655.
CVE-2025-21655 involves a potential issue where io_eventfd_signal() lacks proper RCU period deferral leading to improper resource management.