Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The state of DevOps and AI: Not just hype

      September 1, 2025

      A Breeze Of Inspiration In September (2025 Wallpapers Edition)

      August 31, 2025

      10 Top Generative AI Development Companies for Enterprise Node.js Projects

      August 30, 2025

      Prompting Is A Design Act: How To Brief, Guide And Iterate With AI

      August 29, 2025

      Look out, Meta Ray-Bans! These AI glasses just raised over $1M in pre-orders in 3 days

      September 2, 2025

      Samsung ‘Galaxy Glasses’ powered by Android XR are reportedly on track to be unveiled this month

      September 2, 2025

      The M4 iPad Pro is discounted $100 as a last-minute Labor Day deal

      September 2, 2025

      Distribution Release: Linux From Scratch 12.4

      September 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025
      Recent

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025

      August report 2025

      September 2, 2025

      Fake News Detection using Python Machine Learning (ML)

      September 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025
      Recent

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025

      Download Transcribe! for Windows

      September 1, 2025

      Microsoft Fixes CertificateServicesClient (CertEnroll) Error in Windows 11

      September 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38349 – Linux Kernel Epoll Use-After-Free Vulnerability

    CVE-2025-38349 – Linux Kernel Epoll Use-After-Free Vulnerability

    July 18, 2025

    CVE ID : CVE-2025-38349

    Published : July 18, 2025, 8:15 a.m. | 2 hours, 42 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    eventpoll: don’t decrement ep refcount while still holding the ep mutex

    Jann Horn points out that epoll is decrementing the ep refcount and then
    doing a

    mutex_unlock(&ep->mtx);

    afterwards. That’s very wrong, because it can lead to a use-after-free.

    That pattern is actually fine for the very last reference, because the
    code in question will delay the actual call to “ep_free(ep)” until after
    it has unlocked the mutex.

    But it’s wrong for the much subtler “next to last” case when somebody
    *else* may also be dropping their reference and free the ep while we’re
    still using the mutex.

    Note that this is true even if that other user is also using the same ep
    mutex: mutexes, unlike spinlocks, can not be used for object ownership,
    even if they guarantee mutual exclusion.

    A mutex “unlock” operation is not atomic, and as one user is still
    accessing the mutex as part of unlocking it, another user can come in
    and get the now released mutex and free the data structure while the
    first user is still cleaning up.

    See our mutex documentation in Documentation/locking/mutex-design.rst,
    in particular the section [1] about semantics:

    “mutex_unlock() may access the mutex structure even after it has
    internally released the lock already – so it’s not safe for
    another context to acquire the mutex and assume that the
    mutex_unlock() context is not using the structure anymore”

    So if we drop our ep ref before the mutex unlock, but we weren’t the
    last one, we may then unlock the mutex, another user comes in, drops
    _their_ reference and releases the ‘ep’ as it now has no users – all
    while the mutex_unlock() is still accessing it.

    Fix this by simply moving the ep refcount dropping to outside the mutex:
    the refcount itself is atomic, and doesn’t need mutex protection (that’s
    the whole _point_ of refcounts: unlike mutexes, they are inherently
    about object lifetimes).

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-6197 – Grafana Open Redirect Vulnerability
    Next Article CVE-2025-26855 – Joomla Articles Calendar SQL Injection

    Related Posts

    Development

    Hacker suspected of trying to cheat his way into university is arrested in Spain

    September 2, 2025
    Development

    ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics

    September 2, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-47280 – Umbraco Forms Email Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    A new way to edit or generate images

    Artificial Intelligence

    CVE-2025-40555 – APOGEE PXC+TALON TC Series BACnet Broadcast Storm Denial of Service Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-49162 – Arris VIP1113 TFTP File Overwrite Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Linux

    Rilasciato il Nuovo Driver NVIDIA 575.64 per GNU/Linux con Correzioni Importanti

    June 18, 2025

    Il driver grafico NVIDIA rappresenta uno degli strumenti fondamentali per chi utilizza sistemi basati su…

    This AI Paper Introduces Group Think: A Token-Level Multi-Agent Reasoning Paradigm for Faster and Collaborative LLM Inference

    May 24, 2025

    Microsoft Teams Will Soon Let You React with Multiple Emojis Per Message

    May 21, 2025

    CVE-2025-46803 – Screen PTY Escalation of Privilege

    May 26, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.