{"uuid": "39d5f6b6-1f3a-4abc-a339-f77cd898461c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21655", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5084", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21655\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/eventfd: ensure io_eventfd_signal() defers another RCU period\n\nio_eventfd_do_signal() is invoked from an RCU callback, but when\ndropping the reference to the io_ev_fd, it calls io_eventfd_free()\ndirectly if the refcount drops to zero. This isn't correct, as any\npotential freeing of the io_ev_fd should be deferred another RCU grace\nperiod.\n\nJust call io_eventfd_put() rather than open-code the dec-and-test and\nfree, which will correctly defer it another RCU grace period.\n\ud83d\udccf Published: 2025-01-20T13:48:40.544Z\n\ud83d\udccf Modified: 2025-02-23T07:15:02.767Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/6b63308c28987c6010b1180c72a6db4df6c68033\n2. https://git.kernel.org/stable/c/8efff2aa2d95dc437ab67c5b4a9f1d3f367baa10\n3. https://git.kernel.org/stable/c/a7085c3ae43b86d4b3d1b8275e6a67f14257e3b7\n4. https://git.kernel.org/stable/c/c9a40292a44e78f71258b8522655bffaf5753bdb\n5. https://project-zero.issues.chromium.org/issues/388499293", "creation_timestamp": "2025-02-23T07:24:30.000000Z"}