In the Linux kernel, the following vulnerability has been resolved:
bpf: Send signals asynchronously if !preemptible
BPF programs can execute in all kinds of contexts and when a program
running in a non-preemptible context uses the bpfsendsignal() kfunc,
it will cause issues because this kfunc can sleep.
Change irqs_disabled() to !preemptible().
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21728.json",
"cna_assigner": "Linux"
}