Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      10 Benefits of Hiring a React.js Development Company (2025–2026 Edition)

      August 13, 2025

      From Line To Layout: How Past Experiences Shape Your Design Career

      August 13, 2025

      Hire React.js Developers in the US: How to Choose the Right Team for Your Needs

      August 13, 2025

      Google’s coding agent Jules gets critique functionality

      August 13, 2025

      GitHub Availability Report: July 2025

      August 13, 2025

      From private to public: How a United Nations organization open sourced its tech in four steps

      August 13, 2025

      We Might Need Something Between Root and Relative CSS Units for “Base Elements”

      August 13, 2025

      Microsoft Targets ‘Critical AI Talent’ from Meta to Dominate Next AI Breakthroughs

      August 13, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel Global Scopes: Automatic Query Filtering

      August 12, 2025
      Recent

      Laravel Global Scopes: Automatic Query Filtering

      August 12, 2025

      Building MCP Servers in PHP

      August 12, 2025

      Filament v4 is Stable!

      August 12, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Anthropic Offers Claude AI to All U.S. Government Branches for Just $1

      August 13, 2025
      Recent

      Anthropic Offers Claude AI to All U.S. Government Branches for Just $1

      August 13, 2025

      Microsoft Tests Prompting Heavy Chrome Users to Pin Edge to Windows 11 Taskbar

      August 13, 2025

      PC Maintenance Software: 6 Best to Use in 2025

      August 13, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-37824 – Linux Kernel Tipc NULL Pointer Dereference Vulnerability

    CVE-2025-37824 – Linux Kernel Tipc NULL Pointer Dereference Vulnerability

    May 8, 2025

    CVE ID : CVE-2025-37824

    Published : May 8, 2025, 7:15 a.m. | 58 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    tipc: fix NULL pointer dereference in tipc_mon_reinit_self()

    syzbot reported:

    tipc: Node number set to 1055423674
    Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI
    KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
    CPU: 3 UID: 0 PID: 6017 Comm: kworker/3:5 Not tainted 6.15.0-rc1-syzkaller-00246-g900241a5cc15 #0 PREEMPT(full)
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
    Workqueue: events tipc_net_finalize_work
    RIP: 0010:tipc_mon_reinit_self+0x11c/0x210 net/tipc/monitor.c:719
    …
    RSP: 0018:ffffc9000356fb68 EFLAGS: 00010246
    RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000003ee87cba
    RDX: 0000000000000000 RSI: ffffffff8dbc56a7 RDI: ffff88804c2cc010
    RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000000
    R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000007
    R13: fffffbfff2111097 R14: ffff88804ead8000 R15: ffff88804ead9010
    FS: 0000000000000000(0000) GS:ffff888097ab9000(0000) knlGS:0000000000000000
    CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00000000f720eb00 CR3: 000000000e182000 CR4: 0000000000352ef0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    Call Trace:

    tipc_net_finalize+0x10b/0x180 net/tipc/net.c:140
    process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238
    process_scheduled_works kernel/workqueue.c:3319 [inline]
    worker_thread+0x6c8/0xf10 kernel/workqueue.c:3400
    kthread+0x3c2/0x780 kernel/kthread.c:464
    ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153
    ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245

    …
    RIP: 0010:tipc_mon_reinit_self+0x11c/0x210 net/tipc/monitor.c:719
    …
    RSP: 0018:ffffc9000356fb68 EFLAGS: 00010246
    RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000003ee87cba
    RDX: 0000000000000000 RSI: ffffffff8dbc56a7 RDI: ffff88804c2cc010
    RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000000
    R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000007
    R13: fffffbfff2111097 R14: ffff88804ead8000 R15: ffff88804ead9010
    FS: 0000000000000000(0000) GS:ffff888097ab9000(0000) knlGS:0000000000000000
    CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00000000f720eb00 CR3: 000000000e182000 CR4: 0000000000352ef0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

    There is a racing condition between workqueue created when enabling
    bearer and another thread created when disabling bearer right after
    that as follow:

    enabling_bearer | disabling_bearer
    ————— | —————-
    tipc_disc_timeout() |
    { | bearer_disable()
    … | {
    schedule_work(&tn->work); | tipc_mon_delete()
    … | {
    } | …
    | write_lock_bh(&mon->lock);
    | mon->self = NULL;
    | write_unlock_bh(&mon->lock);
    | …
    | }
    tipc_net_finalize_work() | }
    { |
    … |
    tipc_net_finalize() |
    { |
    … |
    tipc_mon_reinit_self() |
    { |
    … |
    write_lock_bh(&mon->lock); |
    mon->self->addr = tipc_own_addr(net); |
    write_unlock_bh(&mon->lock); |
    …
    —truncated—

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-37825 – “Nvidia Nvmet Out-of-Bounds Access Vulnerability”
    Next Article CVE-2025-37822 – RISC-V Linux Kernel Uprobes Fence Vulnerability

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-8879 – Google Chrome Heap Buffer Overflow Vulnerability

    August 13, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-8880 – Google Chrome V8 Race Condition Execution of Arbitrary Code

    August 13, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2023-53133 – Apache Linux bpf Infinite Loop Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Microsoft Copilot quietly tests ChatGPT Connectors feature, lets you view OneDrive content

    Operating Systems

    Razer Iskur V2 drops to $399.99 — the gaming chair with the best lumbar support we’ve ever tested

    News & Updates

    Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices

    Development

    Highlights

    CVE-2025-26063 – Intelbras RX1500/3000 – Unauthenticated Remote Code Execution Vulnerability

    July 31, 2025

    CVE ID : CVE-2025-26063

    Published : July 31, 2025, 7:15 p.m. | 5 hours, 11 minutes ago

    Description : An issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to execute arbitrary code via injecting a crafted payload into the ESSID name when creating a network.

    Severity: 9.8 | CRITICAL

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Looking ahead to the AI Seoul Summit

    May 13, 2025

    CVE-2025-40577 – “SCALANCE LPE9403 Profinet Packet Validation Remote Code Execution Denial of Service”

    May 13, 2025

    Linux Kernel 6.14: A Leap Forward in Intel and AMD CPU Support

    July 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.