In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
Fix the following deadlock:
CPU A
_free_event()
perf_kprobe_destroy()
mutex_lock(&event_mutex)
perf_trace_event_unreg()
synchronize_rcu_tasks_trace()
There are several paths where _free_event() grabs event_mutex
and calls sync_rcu_tasks_trace. Above is one such case.
CPU B
bpf_prog_test_run_syscall()
rcu_read_lock_trace()
bpf_prog_run_pin_on_cpu()
bpf_prog_load()
bpf_tracing_func_proto()
trace_set_clr_event()
mutex_lock(&event_mutex)
Delegate trace_set_clr_event() to workqueue to avoid
such lock dependency.
References
| Link | Resource |
|---|---|
| https://git.kernel.org/stable/c/45286680b385f2592db3003554872388dee66d68 | Patch |
| https://git.kernel.org/stable/c/4580f4e0ebdf8dc8d506ae926b88510395a0c1d1 | Patch |
| https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-05-09 07:16
Updated : 2026-01-02 16:15
NVD link : CVE-2025-37884
Mitre link : CVE-2025-37884
CVE.ORG link : CVE-2025-37884
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-667
Improper Locking
