Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Upwork Freelancers vs Dedicated React.js Teams: What’s Better for Your Project in 2025?

      August 1, 2025

      Is Agile dead in the age of AI?

      August 1, 2025

      Top 15 Enterprise Use Cases That Justify Hiring Node.js Developers in 2025

      July 31, 2025

      The Core Model: Start FROM The Answer, Not WITH The Solution

      July 31, 2025

      Finally, a sleek gaming laptop I can take to the office (without sacrificing power)

      August 1, 2025

      These jobs face the highest risk of AI takeover, according to Microsoft

      August 1, 2025

      Apple’s tariff costs and iPhone sales are soaring – how long until device prices are too?

      August 1, 2025

      5 ways to successfully integrate AI agents into your workplace

      August 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Enhancing Laravel Queries with Reusable Scope Patterns

      August 1, 2025
      Recent

      Enhancing Laravel Queries with Reusable Scope Patterns

      August 1, 2025

      Everything We Know About Livewire 4

      August 1, 2025

      Everything We Know About Livewire 4

      August 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      YouTube wants to use AI to treat “teens as teens and adults as adults” — with the most age-appropriate experiences and protections

      August 1, 2025
      Recent

      YouTube wants to use AI to treat “teens as teens and adults as adults” — with the most age-appropriate experiences and protections

      August 1, 2025

      Sam Altman is afraid of OpenAI’s GPT-5 creation — “The Manhattan Project feels very fast, like there are no adults in the room”

      August 1, 2025

      9 new features that arrived on the Windows 11 Insider Program during the second half of July 2025

      August 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2023-53122 – RISC-V SiFive Errata Patching Mutex Vulnerability

    CVE-2023-53122 – RISC-V SiFive Errata Patching Mutex Vulnerability

    May 2, 2025

    CVE ID : CVE-2023-53122

    Published : May 2, 2025, 4:15 p.m. | 34 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    RISC-V: fix taking the text_mutex twice during sifive errata patching

    Chris pointed out that some bonehead, *cough* me *cough*, added two
    mutex_locks() to the SiFive errata patching. The second was meant to
    have been a mutex_unlock().

    This results in errors such as

    Unable to handle kernel NULL pointer dereference at virtual address 0000000000000030
    Oops [#1]
    Modules linked in:
    CPU: 0 PID: 0 Comm: swapper Not tainted
    6.2.0-rc1-starlight-00079-g9493e6f3ce02 #229
    Hardware name: BeagleV Starlight Beta (DT)
    epc : __schedule+0x42/0x500
    ra : schedule+0x46/0xce
    epc : ffffffff8065957c ra : ffffffff80659a80 sp : ffffffff81203c80
    gp : ffffffff812d50a0 tp : ffffffff8120db40 t0 : ffffffff81203d68
    t1 : 0000000000000001 t2 : 4c45203a76637369 s0 : ffffffff81203cf0
    s1 : ffffffff8120db40 a0 : 0000000000000000 a1 : ffffffff81213958
    a2 : ffffffff81213958 a3 : 0000000000000000 a4 : 0000000000000000
    a5 : ffffffff80a1bd00 a6 : 0000000000000000 a7 : 0000000052464e43
    s2 : ffffffff8120db41 s3 : ffffffff80a1ad00 s4 : 0000000000000000
    s5 : 0000000000000002 s6 : ffffffff81213938 s7 : 0000000000000000
    s8 : 0000000000000000 s9 : 0000000000000001 s10: ffffffff812d7204
    s11: ffffffff80d3c920 t3 : 0000000000000001 t4 : ffffffff812e6dd7
    t5 : ffffffff812e6dd8 t6 : ffffffff81203bb8
    status: 0000000200000100 badaddr: 0000000000000030 cause: 000000000000000d
    [] schedule+0x46/0xce
    [] schedule_preempt_disabled+0x16/0x28
    [] __mutex_lock.constprop.0+0x3fe/0x652
    [] __mutex_lock_slowpath+0xe/0x16
    [] mutex_lock+0x42/0x4c
    [] sifive_errata_patch_func+0xf6/0x18c
    [] _apply_alternatives+0x74/0x76
    [] apply_boot_alternatives+0x3c/0xfa
    [] setup_arch+0x60c/0x640
    [] start_kernel+0x8e/0x99c
    —[ end trace 0000000000000000 ]—

    [Palmer: pick up Geert’s bug report from the thread]

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2023-53125 – “Linux Kernel SMSc75xx Network Stack Buffer Overflow”
    Next Article CVE-2023-53123 – Linux Kernel PCI s390 Use-After-Free Vulnerability

    Related Posts

    Development

    This month in security with Tony Anscombe – July 2025 edition

    August 1, 2025
    Development

    WordPress AI Engine Plugin Bug Allows Remote Code Execution – Update Now

    August 1, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Why Manual Data Entry Is Killing Estate Planning Productivity

    Artificial Intelligence

    CVE-2025-4985 – “3DEXPERIENCE Project Portfolio Manager Stored XSS Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-53902 – Tuleap Information Disclosure Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Timeline Expectations: How Long Does It Really Take to Build an AI Solution?

    Web Development

    Highlights

    CVE-2025-4336 – eMagicOne Store Manager for WooCommerce Arbitrary File Upload Vulnerability

    May 24, 2025

    CVE ID : CVE-2025-4336

    Published : May 24, 2025, 4:15 a.m. | 29 minutes ago

    Description : The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_file() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible. This is only exploitable by unauthenticated attackers in default configurations where the the default password is left as 1:1, or where the attacker gains access to the credentials.

    Severity: 8.1 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

    June 22, 2025

    This Microsoft pay scale reveals AI pros are making bank — with compensation packages reaching up to $336,000/year

    July 17, 2025

    Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise

    June 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.