Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Power Of The Intl API: A Definitive Guide To Browser-Native Internationalization

      August 8, 2025

      This week in AI dev tools: GPT-5, Claude Opus 4.1, and more (August 8, 2025)

      August 8, 2025

      Elastic simplifies log analytics for SREs and developers with launch of Log Essentials

      August 7, 2025

      OpenAI launches GPT-5

      August 7, 2025

      5 ways business leaders can transform workplace culture – and it starts by listening

      August 8, 2025

      My 4 favorite image editing apps on Linux – and two are free Photoshop alternatives

      August 8, 2025

      How Google’s Genie 3 could change AI video – and let you build your own interactive worlds

      August 8, 2025

      How you’re charging your tablet is slowly killing it – 3 methods to avoid (and the right way)

      August 8, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Establishing Consistent Data Foundations with Laravel’s Database Population System

      August 8, 2025
      Recent

      Establishing Consistent Data Foundations with Laravel’s Database Population System

      August 8, 2025

      Generate Postman Collections from Laravel Routes

      August 8, 2025

      This Week in Laravel: Free Laravel Idea, Laracon News, and More

      August 8, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Lenovo Legion Go 2 vs Legion Go — How Do These Gaming Handhelds Compare Based on Rumored Specs?

      August 8, 2025
      Recent

      Lenovo Legion Go 2 vs Legion Go — How Do These Gaming Handhelds Compare Based on Rumored Specs?

      August 8, 2025

      9 Default Settings in Windows 11 You Didn’t Know Could Affect Performance and Privacy

      August 8, 2025

      DICE Responds to Battlefield 6 Community: Key Updates on Map Flow and Class Mechanics

      August 8, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-37791 – Dell PowerEdge ethtool Stack Corruption Vulnerability

    CVE-2025-37791 – Dell PowerEdge ethtool Stack Corruption Vulnerability

    May 1, 2025

    CVE ID : CVE-2025-37791

    Published : May 1, 2025, 2:15 p.m. | 1 hour, 10 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    ethtool: cmis_cdb: use correct rpl size in ethtool_cmis_module_poll()

    rpl is passed as a pointer to ethtool_cmis_module_poll(), so the correct
    size of rpl is sizeof(*rpl) which should be just 1 byte. Using the
    pointer size instead can cause stack corruption:

    Kernel panic – not syncing: stack-protector: Kernel stack is corrupted in: ethtool_cmis_wait_for_cond+0xf4/0x100
    CPU: 72 UID: 0 PID: 4440 Comm: kworker/72:2 Kdump: loaded Tainted: G OE 6.11.0 #24
    Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
    Hardware name: Dell Inc. PowerEdge R760/04GWWM, BIOS 1.6.6 09/20/2023
    Workqueue: events module_flash_fw_work
    Call Trace:

    panic+0x339/0x360
    ? ethtool_cmis_wait_for_cond+0xf4/0x100
    ? __pfx_status_success+0x10/0x10
    ? __pfx_status_fail+0x10/0x10
    __stack_chk_fail+0x10/0x10
    ethtool_cmis_wait_for_cond+0xf4/0x100
    ethtool_cmis_cdb_execute_cmd+0x1fc/0x330
    ? __pfx_status_fail+0x10/0x10
    cmis_cdb_module_features_get+0x6d/0xd0
    ethtool_cmis_cdb_init+0x8a/0xd0
    ethtool_cmis_fw_update+0x46/0x1d0
    module_flash_fw_work+0x17/0xa0
    process_one_work+0x179/0x390
    worker_thread+0x239/0x340
    ? __pfx_worker_thread+0x10/0x10
    kthread+0xcc/0x100
    ? __pfx_kthread+0x10/0x10
    ret_from_fork+0x2d/0x50
    ? __pfx_kthread+0x10/0x10
    ret_from_fork_asm+0x1a/0x30

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-37792 – Linux Bluetooth btrtl NULL Pointer Dereference Vulnerability
    Next Article CVE-2025-37790 – “Linux Net MCTP Socket RCU Free Vulnerability”

    Related Posts

    Development

    Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

    August 8, 2025
    Development

    Black Hat USA 2025: Policy compliance and the myth of the silver bullet

    August 8, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Microsoft is finally ready to ship Windows Recall after almost year long delay

    Microsoft is finally ready to ship Windows Recall after almost year long delay

    News & Updates

    Rilasciato Flameshot 13.0: Il Ritorno del Cattura Schermo con Miglioramenti e Nuove Funzionalità

    Linux

    July PlayStation Plus Games Revealed – Check the Complete List Here

    Operating Systems

    CVE-2025-0782 – H2O-3 S3 Bucket Public Write Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-32797 – “Conda-build Arbitrary Code Execution via Insecure File Permissions”

    June 16, 2025

    CVE ID : CVE-2025-32797

    Published : June 16, 2025, 7:15 p.m. | 1 hour, 42 minutes ago

    Description : Conda-build contains commands and tools to build conda packages. Prior to version 25.3.1, The write_build_scripts function in conda-build creates the temporary build script conda_build.sh with overly permissive file permissions (0o766), allowing write access to all users. Attackers with filesystem access can exploit a race condition to overwrite the script before execution, enabling arbitrary code execution under the victim’s privileges. This risk is significant in shared environments, potentially leading to full system compromise. Even with non-static directory names, attackers can monitor parent directories for file creation events. The brief window between script creation (with insecure permissions) and execution allows rapid overwrites. Directory names can also be inferred via timestamps or logs, and automation enables exploitation even with semi-randomized paths by acting within milliseconds of detection. This issue has been patched in version 25.3.1. A workaround involves restricting conda_build.sh permissions from 0o766 to 0o700 (owner-only read/write/execute). Additionally, use atomic file creation (write to a temporary randomized filename and rename atomically) to minimize the race condition window.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Should you ever pay for Linux? 5 times I would – and why

    May 27, 2025

    Xbox introduces limited Witcher 3 10th anniversary controllers, and they’re available right now

    May 22, 2025

    Chargebee Starter Kit for Billing in Laravel

    May 20, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.