Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Mirantis reveals Lens Prism, an AI copilot for operating Kubernetes clusters

      July 3, 2025

      Avoid these common platform engineering mistakes

      July 3, 2025

      Full-Stack Techies vs Toptal: Which Is Better for React.js Outsourcing?

      July 3, 2025

      The AI productivity paradox in software engineering: Balancing efficiency and human skill retention

      July 2, 2025

      Microsoft Gaming studios head Matt Booty says “overall portfolio strategy is unchanged” — with more than 40 games in production

      July 3, 2025

      Capcom reports that its Steam game sales have risen massively — despite flagship titles like Monster Hunter Wilds receiving profuse backlash from PC players

      July 3, 2025

      Cloudflare is fighting to safeguard “the future of the web itself” — standing directly in the way of leading AI firms

      July 3, 2025

      Microsoft reportedly lacks the know-how to fully leverage OpenAI’s tech — despite holding IP rights

      July 3, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      PHP 8.5.0 Alpha 1 available for testing

      July 3, 2025
      Recent

      PHP 8.5.0 Alpha 1 available for testing

      July 3, 2025

      Recording cross browser compatible media

      July 3, 2025

      Celebrating Perficient’s Third Databricks Champion

      July 3, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft Gaming studios head Matt Booty says “overall portfolio strategy is unchanged” — with more than 40 games in production

      July 3, 2025
      Recent

      Microsoft Gaming studios head Matt Booty says “overall portfolio strategy is unchanged” — with more than 40 games in production

      July 3, 2025

      Capcom reports that its Steam game sales have risen massively — despite flagship titles like Monster Hunter Wilds receiving profuse backlash from PC players

      July 3, 2025

      Cloudflare is fighting to safeguard “the future of the web itself” — standing directly in the way of leading AI firms

      July 3, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38176 – Linux Binder Use-After-Free Vulnerability

    CVE-2025-38176 – Linux Binder Use-After-Free Vulnerability

    July 4, 2025

    CVE ID : CVE-2025-38176

    Published : July 4, 2025, 11:15 a.m. | 37 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    binder: fix use-after-free in binderfs_evict_inode()

    Running ‘stress-ng –binderfs 16 –timeout 300’ under KASAN-enabled
    kernel, I’ve noticed the following:

    BUG: KASAN: slab-use-after-free in binderfs_evict_inode+0x1de/0x2d0
    Write of size 8 at addr ffff88807379bc08 by task stress-ng-binde/1699

    CPU: 0 UID: 0 PID: 1699 Comm: stress-ng-binde Not tainted 6.14.0-rc7-g586de92313fc-dirty #13
    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
    Call Trace:

    dump_stack_lvl+0x1c2/0x2a0
    ? __pfx_dump_stack_lvl+0x10/0x10
    ? __pfx__printk+0x10/0x10
    ? __pfx_lock_release+0x10/0x10
    ? __virt_addr_valid+0x18c/0x540
    ? __virt_addr_valid+0x469/0x540
    print_report+0x155/0x840
    ? __virt_addr_valid+0x18c/0x540
    ? __virt_addr_valid+0x469/0x540
    ? __phys_addr+0xba/0x170
    ? binderfs_evict_inode+0x1de/0x2d0
    kasan_report+0x147/0x180
    ? binderfs_evict_inode+0x1de/0x2d0
    binderfs_evict_inode+0x1de/0x2d0
    ? __pfx_binderfs_evict_inode+0x10/0x10
    evict+0x524/0x9f0
    ? __pfx_lock_release+0x10/0x10
    ? __pfx_evict+0x10/0x10
    ? do_raw_spin_unlock+0x4d/0x210
    ? _raw_spin_unlock+0x28/0x50
    ? iput+0x697/0x9b0
    __dentry_kill+0x209/0x660
    ? shrink_kill+0x8d/0x2c0
    shrink_kill+0xa9/0x2c0
    shrink_dentry_list+0x2e0/0x5e0
    shrink_dcache_parent+0xa2/0x2c0
    ? __pfx_shrink_dcache_parent+0x10/0x10
    ? __pfx_lock_release+0x10/0x10
    ? __pfx_do_raw_spin_lock+0x10/0x10
    do_one_tree+0x23/0xe0
    shrink_dcache_for_umount+0xa0/0x170
    generic_shutdown_super+0x67/0x390
    kill_litter_super+0x76/0xb0
    binderfs_kill_super+0x44/0x90
    deactivate_locked_super+0xb9/0x130
    cleanup_mnt+0x422/0x4c0
    ? lockdep_hardirqs_on+0x9d/0x150
    task_work_run+0x1d2/0x260
    ? __pfx_task_work_run+0x10/0x10
    resume_user_mode_work+0x52/0x60
    syscall_exit_to_user_mode+0x9a/0x120
    do_syscall_64+0x103/0x210
    ? asm_sysvec_apic_timer_interrupt+0x1a/0x20
    entry_SYSCALL_64_after_hwframe+0x77/0x7f
    RIP: 0033:0xcac57b
    Code: c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 f3 0f 1e fa 31 f6 e9 05 00 00 00 0f 1f 44 00 00 f3 0f 1e fa b8
    RSP: 002b:00007ffecf4226a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
    RAX: 0000000000000000 RBX: 00007ffecf422720 RCX: 0000000000cac57b
    RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffecf422850
    RBP: 00007ffecf422850 R08: 0000000028d06ab1 R09: 7fffffffffffffff
    R10: 3fffffffffffffff R11: 0000000000000246 R12: 00007ffecf422718
    R13: 00007ffecf422710 R14: 00007f478f87b658 R15: 00007ffecf422830

    Allocated by task 1705:
    kasan_save_track+0x3e/0x80
    __kasan_kmalloc+0x8f/0xa0
    __kmalloc_cache_noprof+0x213/0x3e0
    binderfs_binder_device_create+0x183/0xa80
    binder_ctl_ioctl+0x138/0x190
    __x64_sys_ioctl+0x120/0x1b0
    do_syscall_64+0xf6/0x210
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

    Freed by task 1705:
    kasan_save_track+0x3e/0x80
    kasan_save_free_info+0x46/0x50
    __kasan_slab_free+0x62/0x70
    kfree+0x194/0x440
    evict+0x524/0x9f0
    do_unlinkat+0x390/0x5b0
    __x64_sys_unlink+0x47/0x50
    do_syscall_64+0xf6/0x210
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

    This ‘stress-ng’ workload causes the concurrent deletions from
    ‘binder_devices’ and so requires full-featured synchronization
    to prevent list corruption.

    I’ve found this issue independently but pretty sure that syzbot did
    the same, so Reported-by: and Closes: should be applicable here as well.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-7060 – Monitorr Remote File Inclusion Vulnerability
    Next Article CVE-2025-38175 – Linux Kernel Binder UAF Vulnerability

    Related Posts

    CVE-2025-28951 – CreedAlly Bulk Featured Image Unrestricted File Upload Vulnerability

    July 4, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-28957 – OwnerRez Cross-Site Scripting

    July 4, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Extreme Mind’s Eye Teleportation Secrets of Srinidhi Ranganathan – India’s Human AI

    Artificial Intelligence

    CVE-2025-46329 – Snowflake libsnowflakeclient Sensitive Information Logging

    Common Vulnerabilities and Exposures (CVEs)

    Windows 11 24H2 breaks SAP GUI (SAPLogon.exe) with ntdll.dll error (0xc0000409)

    Operating Systems

    CVE-2025-4152 – PHPGurukul Online Birth Certificate System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-32402 – RT-Labs P-Net OOB Write Vulnerability

    May 7, 2025

    CVE ID : CVE-2025-32402

    Published : May 7, 2025, 7:15 a.m. | 20 minutes ago

    Description : An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to induce a crash in IO devices that use the library by sending a malicious RPC packet.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    May 2025 Detection Highlights: VMRay Threat Identifiers, Config Extractors for Lumma & VideoSpy, and Fresh YARA Rules.

    June 6, 2025

    CVE-2025-3744 – Nomad Sentinel Policy Bypass

    May 13, 2025

    Ambrosia Sky is a gorgeous science-fiction game that’s all about death, and I can’t wait to play more

    June 11, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.