
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability was discovered in the Linux kernel's binderfsevictinode() function (CVE-2025-38176). The vulnerability was identified on July 4, 2025, affecting the Linux kernel's binder subsystem. The issue was discovered during stress testing using the stress-ng tool with binderfs operations (NVD).
The vulnerability manifests as a use-after-free condition in the binderfsevictinode() function when running concurrent deletions from 'binder_devices'. The issue was discovered using KASAN-enabled kernel testing with the command 'stress-ng --binderfs 16 --timeout 300'. The bug results in a write of size 8 at a freed memory location, potentially leading to memory corruption. The vulnerability was confirmed through kernel debugging tools showing the exact call trace and memory allocation/free patterns (CVE).
The vulnerability could lead to memory corruption in the Linux kernel's binder subsystem, which is a critical component for inter-process communication. This could potentially result in system crashes, information leaks, or privilege escalation, though specific impact details were not fully disclosed in the available sources (NVD).
The vulnerability has been resolved in the Linux kernel through patches that implement proper synchronization mechanisms for concurrent deletions from 'binder_devices'. Users should update to the patched version of the kernel when available (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."