{"uuid": "597f713b-0c1c-4f4b-a594-09aff167b268", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37884", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15689", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37884\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix deadlock between rcu_tasks_trace and event_mutex.\n\nFix the following deadlock:\nCPU A\n_free_event()\n  perf_kprobe_destroy()\n    mutex_lock(&amp;event_mutex)\n      perf_trace_event_unreg()\n        synchronize_rcu_tasks_trace()\n\nThere are several paths where _free_event() grabs event_mutex\nand calls sync_rcu_tasks_trace. Above is one such case.\n\nCPU B\nbpf_prog_test_run_syscall()\n  rcu_read_lock_trace()\n    bpf_prog_run_pin_on_cpu()\n      bpf_prog_load()\n        bpf_tracing_func_proto()\n          trace_set_clr_event()\n            mutex_lock(&amp;event_mutex)\n\nDelegate trace_set_clr_event() to workqueue to avoid\nsuch lock dependency.\n\ud83d\udccf Published: 2025-05-09T06:45:47.462Z\n\ud83d\udccf Modified: 2025-05-09T06:45:47.462Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/255cbc9db7067a83713fd2f4b31034ddd266549a\n2. https://git.kernel.org/stable/c/b5a528a34e1f613565115a7a6016862ccbfcb9ac\n3. https://git.kernel.org/stable/c/c5c833f6375f8ecf9254dd27946c927c7d645421\n4. https://git.kernel.org/stable/c/45286680b385f2592db3003554872388dee66d68\n5. https://git.kernel.org/stable/c/4580f4e0ebdf8dc8d506ae926b88510395a0c1d1", "creation_timestamp": "2025-05-09T07:25:29.000000Z"}