
Cloud Vulnerability DB
A community-led vulnerabilities database
A race condition vulnerability was discovered in the Linux kernel's BPF sockmap implementation, identified as CVE-2025-38154. The vulnerability was disclosed on July 3, 2025, affecting the kernel's socket handling mechanism. The issue occurs when sk->sk_socket is not properly locked or referenced in the backlog thread during skb_send_sock() operations, potentially leading to use-after-free conditions (NVD).
The vulnerability stems from a race condition in the socket handling mechanism where sk->sk_socket is accessed after being freed. The issue manifests when the psock reference count becomes zero after sock_map_close() execution, leading to potential system crashes. The race condition occurs between the backlog thread's skb_send_sock operation and the socket release process, affecting all socket types including TCP, UDP, Unix, and VSOCK (CVE).
The vulnerability can result in system crashes due to use-after-free conditions in the kernel's socket handling mechanism. When exploited, it can cause kernel panics, potentially leading to system instability and denial of service (Rapid7).
The vulnerability has been patched by implementing proper synchronization between the backlog thread and close() thread. The fix increases the psock reference count to avoid race conditions and ensures that sock_map_close() waits for the backlog thread to complete and cancels all pending work (CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."