Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Why Non-Native Content Designers Improve Global UX

      July 18, 2025

      DevOps won’t scale without platform engineering and here’s why your teams are still stuck

      July 18, 2025

      This week in AI dev tools: Slack’s enterprise search, Claude Code’s analytics dashboard, and more (July 18, 2025)

      July 18, 2025

      Report: 71% of tech leaders won’t hire devs without AI skills

      July 17, 2025

      Could OpenAI’s rumored browser be a Chrome-killer? Here’s what I’m expecting

      July 18, 2025

      My favorite lens and screen-cleaning kit keeps my tech spotless, and it only costs $8

      July 18, 2025

      AI’s biggest impact on your workforce is still to come – 3 ways to avoid getting left behind

      July 18, 2025

      Remedy offers update on ‘FBC: Firebreak,’ details coming improvements — “We’ve seen many players come into the game and leave within the first hour.”

      July 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 18, 2025
      Recent

      The details of TC39’s last meeting

      July 18, 2025

      Online Examination System using PHP and MySQL

      July 18, 2025

      A tricky, educational quiz: it’s about time..

      July 18, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      CAD Sketcher – constraint-based geometry sketcher

      July 18, 2025
      Recent

      CAD Sketcher – constraint-based geometry sketcher

      July 18, 2025

      7 Best Free and Open Source Linux FTP Servers

      July 18, 2025

      Best Free and Open Source Alternatives to Autodesk FBX Review

      July 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38349 – Linux Kernel Epoll Use-After-Free Vulnerability

    CVE-2025-38349 – Linux Kernel Epoll Use-After-Free Vulnerability

    July 18, 2025

    CVE ID : CVE-2025-38349

    Published : July 18, 2025, 8:15 a.m. | 2 hours, 42 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    eventpoll: don’t decrement ep refcount while still holding the ep mutex

    Jann Horn points out that epoll is decrementing the ep refcount and then
    doing a

    mutex_unlock(&ep->mtx);

    afterwards. That’s very wrong, because it can lead to a use-after-free.

    That pattern is actually fine for the very last reference, because the
    code in question will delay the actual call to “ep_free(ep)” until after
    it has unlocked the mutex.

    But it’s wrong for the much subtler “next to last” case when somebody
    *else* may also be dropping their reference and free the ep while we’re
    still using the mutex.

    Note that this is true even if that other user is also using the same ep
    mutex: mutexes, unlike spinlocks, can not be used for object ownership,
    even if they guarantee mutual exclusion.

    A mutex “unlock” operation is not atomic, and as one user is still
    accessing the mutex as part of unlocking it, another user can come in
    and get the now released mutex and free the data structure while the
    first user is still cleaning up.

    See our mutex documentation in Documentation/locking/mutex-design.rst,
    in particular the section [1] about semantics:

    “mutex_unlock() may access the mutex structure even after it has
    internally released the lock already – so it’s not safe for
    another context to acquire the mutex and assume that the
    mutex_unlock() context is not using the structure anymore”

    So if we drop our ep ref before the mutex unlock, but we weren’t the
    last one, we may then unlock the mutex, another user comes in, drops
    _their_ reference and releases the ‘ep’ as it now has no users – all
    while the mutex_unlock() is still accessing it.

    Fix this by simply moving the ep refcount dropping to outside the mutex:
    the refcount itself is atomic, and doesn’t need mutex protection (that’s
    the whole _point_ of refcounts: unlike mutexes, they are inherently
    about object lifetimes).

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-6197 – Grafana Open Redirect Vulnerability
    Next Article CVE-2025-26855 – Joomla Articles Calendar SQL Injection

    Related Posts

    Development

    Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

    July 18, 2025
    Development

    CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises

    July 18, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Report: Keeping up with patches is the number one challenge when using open source software

    Tech & Work

    Run small language models cost-efficiently with AWS Graviton and Amazon SageMaker AI

    Machine Learning

    Amfora is a terminal browser for the Gemini protocol

    Linux

    My favorite smart scale tracks 16 different measurements and is 50% off — but hurry

    News & Updates

    Highlights

    AI and automation shift the cybersecurity balance toward attackers

    May 2, 2025

    AI and automation shift the cybersecurity balance toward attackers

    Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according to Fortinet.
    “Our latest Global Threat …
    Read more

    Published Date:
    May 02, 2025 (3 hours, 19 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2024-20439

    linkding is a self-hosted bookmark manager

    May 18, 2025

    CVE-2025-40912 – CryptX for Perl Malformed Unicode Injection Vulnerability

    June 11, 2025

    CVE-2025-48334 – BinaryCarpenter Woo Slider Pro Missing Authorization Vulnerability

    May 30, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.