CVE-2025-21655
io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period io_eventfd_do_signal() is invoked from an RCU callback, but when
dropping the reference to the io_ev_fd, it calls io_eventfd_free()
directly if the refcount drops to zero. This isn't correct, as any
potential freeing of the io_ev_fd should be deferred another RCU grace
period. Just call io_eventfd_put() rather than open-code the dec-and-test and
free, which will correctly defer it another RCU grace period.
In the Linux kernel, the following vulnerability has been resolved: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period io_eventfd_do_signal() is invoked from an RCU callback, but when dropping the reference to the io_ev_fd, it calls io_eventfd_free() directly if the refcount drops to zero. This isn't correct, as any potential freeing of the io_ev_fd should be deferred another RCU grace period. Just call io_eventfd_put() rather than open-code the dec-and-test and free, which will correctly defer it another RCU grace period.
The Linux kernel suffers from a use-after-free of struct io_ev_fd because io_eventfd_do_signal() frees an object when the refcount reaches zero without waiting for the required grace period.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2024-12-29 CVE Reserved
- 2025-01-20 CVE Published
- 2025-02-21 First Exploit
- 2025-11-03 CVE Updated
- 2025-11-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (9)
| URL | Tag | Source |
|---|---|---|
| https://git.kernel.org/stable/c/21a091b970cdbcf3e8ff829234b51be6f9192766 | Vuln. Introduced | |
| https://project-zero.issues.chromium.org/issues/388499293 |
| URL | Date | SRC |
|---|---|---|
| https://packetstorm.news/files/id/189367 | 2025-02-21 |
| URL | Date | SRC |
|---|---|---|
| https://access.redhat.com/security/cve/CVE-2025-21655 | 2025-11-11 | |
| https://bugzilla.redhat.com/show_bug.cgi?id=2338998 | 2025-11-11 |
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.1 < 6.1.125 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.1 < 6.1.125" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.1 < 6.6.72 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.1 < 6.6.72" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.1 < 6.12.10 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.1 < 6.12.10" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.1 < 6.13 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.1 < 6.13" | en |
Affected
| ||||||
