Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Coded Smorgasbord: High Strung

      September 26, 2025

      Chainguard launches trusted collection of verified JavaScript libraries

      September 26, 2025

      CData launches Connect AI to provide agents access to enterprise data sources

      September 26, 2025

      PostgreSQL 18 adds asynchronous I/O to improve performance

      September 26, 2025

      Distribution Release: Neptune 9.0

      September 25, 2025

      Distribution Release: Kali Linux 2025.3

      September 23, 2025

      Distribution Release: SysLinuxOS 13

      September 23, 2025

      Development Release: MX Linux 25 Beta 1

      September 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      PHP 8.5.0 RC 1 available for testing

      September 26, 2025
      Recent

      PHP 8.5.0 RC 1 available for testing

      September 26, 2025

      Terraform Code Generator Using Ollama and CodeGemma

      September 26, 2025

      Beyond Denial: How AI Concierge Services Can Transform Healthcare from Reactive to Proactive

      September 25, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Distribution Release: Neptune 9.0

      September 25, 2025
      Recent

      Distribution Release: Neptune 9.0

      September 25, 2025

      FOSS Weekly #25.39: Kill Switch Phones, LMDE 7, Zorin OS 18 Beta, Polybar, Apt History and More Linux Stuff

      September 25, 2025

      Distribution Release: Kali Linux 2025.3

      September 23, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-37816 – Linux Kernel Mei VSC Buffer Overflow Vulnerability

    CVE-2025-37816 – Linux Kernel Mei VSC Buffer Overflow Vulnerability

    May 8, 2025

    CVE ID : CVE-2025-37816

    Published : May 8, 2025, 7:15 a.m. | 58 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    mei: vsc: Fix fortify-panic caused by invalid counted_by() use

    gcc 15 honors the __counted_by(len) attribute on vsc_tp_packet.buf[]
    and the vsc-tp.c code is using this in a wrong way. len does not contain
    the available size in the buffer, it contains the actual packet length
    *without* the crc. So as soon as vsc_tp_xfer() tries to add the crc to
    buf[] the fortify-panic handler gets triggered:

    [ 80.842193] memcpy: detected buffer overflow: 4 byte write of buffer size 0
    [ 80.842243] WARNING: CPU: 4 PID: 272 at lib/string_helpers.c:1032 __fortify_report+0x45/0x50
    …
    [ 80.843175] __fortify_panic+0x9/0xb
    [ 80.843186] vsc_tp_xfer.cold+0x67/0x67 [mei_vsc_hw]
    [ 80.843210] ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90
    [ 80.843229] ? lockdep_hardirqs_on+0x7c/0x110
    [ 80.843250] mei_vsc_hw_start+0x98/0x120 [mei_vsc]
    [ 80.843270] mei_reset+0x11d/0x420 [mei]

    The easiest fix would be to just drop the counted-by but with the exception
    of the ack buffer in vsc_tp_xfer_helper() which only contains enough room
    for the packet-header, all other uses of vsc_tp_packet always use a buffer
    of VSC_TP_MAX_XFER_SIZE bytes for the packet.

    Instead of just dropping the counted-by, split the vsc_tp_packet struct
    definition into a header and a full-packet definition and use a fixed
    size buf[] in the packet definition, this way fortify-source buffer
    overrun checking still works when enabled.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-37826 – Linux Kernel UFS SCSI Null Pointer Dereference Vulnerability
    Next Article CVE-2025-37817 – Linux kernel Double Free in Chameleon Driver

    Related Posts

    Development

    Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

    September 14, 2025
    Development

    Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

    September 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-5878 – “ESAPI SQL Injection Defense Encoder Encoder.encodeForSQL Improper Neutralization”

    Common Vulnerabilities and Exposures (CVEs)

    CodeSOD: Conventional Events

    News & Updates

    Top 15 Vibe Coding Tools Transforming AI-Driven Software Development in 2025

    Machine Learning

    Microsoft 365 Copilot Wave 2 is here: Take a look at what’s new

    News & Updates

    Highlights

    CVE-2025-55586 – TOTOLINK A3002R Buffer Overflow DoS

    August 18, 2025

    CVE ID : CVE-2025-55586

    Published : Aug. 18, 2025, 8:15 p.m. | 4 hours, 23 minutes ago

    Description : TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow in the url parameter at /boafrm/formFilter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Buon 1° Maggio 2025

    May 1, 2025

    CVE-2024-9639 – ASPECT Remote Code Execution Vulnerability

    May 22, 2025

    Introducing sub-issues: Enhancing issue management on GitHub

    April 11, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.