Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI dev tools: Gemini 2.5 Pro and Flash GA, GitHub Copilot Spaces, and more (June 20, 2025)

      June 20, 2025

      Gemini 2.5 Pro and Flash are generally available and Gemini 2.5 Flash-Lite preview is announced

      June 19, 2025

      CSS Cascade Layers Vs. BEM Vs. Utility Classes: Specificity Control

      June 19, 2025

      IBM launches new integration to help unify AI security and governance

      June 18, 2025

      I used Lenovo’s latest dual-screen OLED laptop for a month and it wouldn’t be my first choice — here’s why

      June 22, 2025

      Here’s how I fixed a dead Steam Deck screen — with Valve proving they still have the best customer service in gaming

      June 22, 2025

      Borderlands 4 drops stunning new story trailer

      June 22, 2025

      DistroWatch Weekly, Issue 1127

      June 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Exploring Lakebase: Databricks’ Next-Gen AI-Native OLTP Database

      June 22, 2025
      Recent

      Exploring Lakebase: Databricks’ Next-Gen AI-Native OLTP Database

      June 22, 2025

      Understanding JavaScript Promise

      June 22, 2025

      Lakeflow: Revolutionizing SCD2 Pipelines with Change Data Capture (CDC)

      June 21, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I used Lenovo’s latest dual-screen OLED laptop for a month and it wouldn’t be my first choice — here’s why

      June 22, 2025
      Recent

      I used Lenovo’s latest dual-screen OLED laptop for a month and it wouldn’t be my first choice — here’s why

      June 22, 2025

      Here’s how I fixed a dead Steam Deck screen — with Valve proving they still have the best customer service in gaming

      June 22, 2025

      Borderlands 4 drops stunning new story trailer

      June 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-37780 – Linux Kernel Isofs Fid Handle Bytes Vulnerability

    CVE-2025-37780 – Linux Kernel Isofs Fid Handle Bytes Vulnerability

    May 1, 2025

    CVE ID : CVE-2025-37780

    Published : May 1, 2025, 2:15 p.m. | 1 hour, 10 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    isofs: Prevent the use of too small fid

    syzbot reported a slab-out-of-bounds Read in isofs_fh_to_parent. [1]

    The handle_bytes value passed in by the reproducing program is equal to 12.
    In handle_to_path(), only 12 bytes of memory are allocated for the structure
    file_handle->f_handle member, which causes an out-of-bounds access when
    accessing the member parent_block of the structure isofs_fid in isofs,
    because accessing parent_block requires at least 16 bytes of f_handle.
    Here, fh_len is used to indirectly confirm that the value of handle_bytes
    is greater than 3 before accessing parent_block.

    [1]
    BUG: KASAN: slab-out-of-bounds in isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183
    Read of size 4 at addr ffff0000cc030d94 by task syz-executor215/6466
    CPU: 1 UID: 0 PID: 6466 Comm: syz-executor215 Not tainted 6.14.0-rc7-syzkaller-ga2392f333575 #0
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
    Call trace:
    show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)
    __dump_stack lib/dump_stack.c:94 [inline]
    dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120
    print_address_description mm/kasan/report.c:408 [inline]
    print_report+0x198/0x550 mm/kasan/report.c:521
    kasan_report+0xd8/0x138 mm/kasan/report.c:634
    __asan_report_load4_noabort+0x20/0x2c mm/kasan/report_generic.c:380
    isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183
    exportfs_decode_fh_raw+0x2dc/0x608 fs/exportfs/expfs.c:523
    do_handle_to_path+0xa0/0x198 fs/fhandle.c:257
    handle_to_path fs/fhandle.c:385 [inline]
    do_handle_open+0x8cc/0xb8c fs/fhandle.c:403
    __do_sys_open_by_handle_at fs/fhandle.c:443 [inline]
    __se_sys_open_by_handle_at fs/fhandle.c:434 [inline]
    __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434
    __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
    invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
    el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
    do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
    el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744
    el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762
    el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600

    Allocated by task 6466:
    kasan_save_stack mm/kasan/common.c:47 [inline]
    kasan_save_track+0x40/0x78 mm/kasan/common.c:68
    kasan_save_alloc_info+0x40/0x50 mm/kasan/generic.c:562
    poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
    __kasan_kmalloc+0xac/0xc4 mm/kasan/common.c:394
    kasan_kmalloc include/linux/kasan.h:260 [inline]
    __do_kmalloc_node mm/slub.c:4294 [inline]
    __kmalloc_noprof+0x32c/0x54c mm/slub.c:4306
    kmalloc_noprof include/linux/slab.h:905 [inline]
    handle_to_path fs/fhandle.c:357 [inline]
    do_handle_open+0x5a4/0xb8c fs/fhandle.c:403
    __do_sys_open_by_handle_at fs/fhandle.c:443 [inline]
    __se_sys_open_by_handle_at fs/fhandle.c:434 [inline]
    __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434
    __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
    invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
    el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
    do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
    el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744
    el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762
    el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-37782 – Linux HFS slub Out-of-Bounds Write
    Next Article CVE-2025-37779 – “ERofs Linux Kernel Folio UAF Vulnerability”

    Related Posts

    Security

    WordPress Motors theme flaw mass-exploited to hijack admin accounts

    June 22, 2025
    Security

    Weekly Cybersecurity News Recap – Top Vulnerabilities, Threat and Data Breaches

    June 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Finally, I found an Android Auto adapter that’s highly functional, lag-free, and priced well

    News & Updates

    CVE-2025-32884 – goTenna Mesh Phone Number Disclosure

    Common Vulnerabilities and Exposures (CVEs)

    Banana Pi BPI-F3 Single Board Computer Running Linux: Introduction

    Linux

    CVE-2025-47490 – Rustaurius Ultimate WP Mail SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2024-13930 – ASPECT DoS Denial of Service

    May 22, 2025

    CVE ID : CVE-2024-13930

    Published : May 22, 2025, 6:15 p.m. | 36 minutes ago

    Description : An Unchecked Loop Condition in ASPECT provides an attacker the ability to maliciously consume system resources if session administrator credentials become compromised
    This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.

    Severity: 4.9 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-4642 – CVE-2016-100005: Apache Struts Remote Code Execution

    May 22, 2025

    CVE-2024-40114 – Sitecom WLX-2006 Wall Mount Range Extender XSS Language Cookie Manipulation

    June 2, 2025

    CVE-2025-3782 – Cision Block Stored Cross-Site Scripting Vulnerability

    May 6, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.