Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Why Non-Native Content Designers Improve Global UX

      July 18, 2025

      DevOps won’t scale without platform engineering and here’s why your teams are still stuck

      July 18, 2025

      This week in AI dev tools: Slack’s enterprise search, Claude Code’s analytics dashboard, and more (July 18, 2025)

      July 18, 2025

      Report: 71% of tech leaders won’t hire devs without AI skills

      July 17, 2025

      Could OpenAI’s rumored browser be a Chrome-killer? Here’s what I’m expecting

      July 18, 2025

      My favorite lens and screen-cleaning kit keeps my tech spotless, and it only costs $8

      July 18, 2025

      AI’s biggest impact on your workforce is still to come – 3 ways to avoid getting left behind

      July 18, 2025

      Remedy offers update on ‘FBC: Firebreak,’ details coming improvements — “We’ve seen many players come into the game and leave within the first hour.”

      July 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 18, 2025
      Recent

      The details of TC39’s last meeting

      July 18, 2025

      Online Examination System using PHP and MySQL

      July 18, 2025

      A tricky, educational quiz: it’s about time..

      July 18, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      CAD Sketcher – constraint-based geometry sketcher

      July 18, 2025
      Recent

      CAD Sketcher – constraint-based geometry sketcher

      July 18, 2025

      7 Best Free and Open Source Linux FTP Servers

      July 18, 2025

      Best Free and Open Source Alternatives to Autodesk FBX Review

      July 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38349 – Linux Kernel Epoll Use-After-Free Vulnerability

    CVE-2025-38349 – Linux Kernel Epoll Use-After-Free Vulnerability

    July 18, 2025

    CVE ID : CVE-2025-38349

    Published : July 18, 2025, 8:15 a.m. | 2 hours, 42 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    eventpoll: don’t decrement ep refcount while still holding the ep mutex

    Jann Horn points out that epoll is decrementing the ep refcount and then
    doing a

    mutex_unlock(&ep->mtx);

    afterwards. That’s very wrong, because it can lead to a use-after-free.

    That pattern is actually fine for the very last reference, because the
    code in question will delay the actual call to “ep_free(ep)” until after
    it has unlocked the mutex.

    But it’s wrong for the much subtler “next to last” case when somebody
    *else* may also be dropping their reference and free the ep while we’re
    still using the mutex.

    Note that this is true even if that other user is also using the same ep
    mutex: mutexes, unlike spinlocks, can not be used for object ownership,
    even if they guarantee mutual exclusion.

    A mutex “unlock” operation is not atomic, and as one user is still
    accessing the mutex as part of unlocking it, another user can come in
    and get the now released mutex and free the data structure while the
    first user is still cleaning up.

    See our mutex documentation in Documentation/locking/mutex-design.rst,
    in particular the section [1] about semantics:

    “mutex_unlock() may access the mutex structure even after it has
    internally released the lock already – so it’s not safe for
    another context to acquire the mutex and assume that the
    mutex_unlock() context is not using the structure anymore”

    So if we drop our ep ref before the mutex unlock, but we weren’t the
    last one, we may then unlock the mutex, another user comes in, drops
    _their_ reference and releases the ‘ep’ as it now has no users – all
    while the mutex_unlock() is still accessing it.

    Fix this by simply moving the ep refcount dropping to outside the mutex:
    the refcount itself is atomic, and doesn’t need mutex protection (that’s
    the whole _point_ of refcounts: unlike mutexes, they are inherently
    about object lifetimes).

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-6197 – Grafana Open Redirect Vulnerability
    Next Article CVE-2025-26855 – Joomla Articles Calendar SQL Injection

    Related Posts

    Development

    Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

    July 18, 2025
    Development

    CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises

    July 18, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Critical Langflow RCE flaw exploited to hack AI app servers

    Security

    Automate document translation and standardization with Amazon Bedrock and Amazon Translate

    Machine Learning

    Using CSS backdrop-filter for UI Effects

    News & Updates

    CVE-2025-5686 – WordPress Paged Gallery Stored Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    How AI coding agents could destroy open source software

    May 30, 2025

    Imagine a single rogue line of code slipping past your tired eyes – and suddenly…

    CVE-2025-4116 – Netgear JWNR2000 Buffer Overflow Vulnerability

    April 30, 2025

    DeepMind CEO calls Google’s updated Gemini 2.5 Pro AI “the best coding model” with a taste for aesthetic web development

    May 8, 2025

    DistroWatch Weekly, Issue 1129

    July 6, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.