Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Power Of The Intl API: A Definitive Guide To Browser-Native Internationalization

      August 8, 2025

      This week in AI dev tools: GPT-5, Claude Opus 4.1, and more (August 8, 2025)

      August 8, 2025

      Elastic simplifies log analytics for SREs and developers with launch of Log Essentials

      August 7, 2025

      OpenAI launches GPT-5

      August 7, 2025

      How to use GitHub Copilot to level up your code reviews and pull requests

      August 8, 2025

      How to Prepare for CSS-Specific Interview Questions

      August 8, 2025

      Error’d: Voluntold

      August 8, 2025

      This $180 mini projector has no business being this good for the price

      August 7, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      How to install stream to IoT platform — Total.js

      August 8, 2025
      Recent

      How to install stream to IoT platform — Total.js

      August 8, 2025

      Heart Disease Prediction using Python & Machine Learning

      August 8, 2025

      How JavaScript really evolves, the inside story

      August 8, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Guardians of Privacy: How Security-Driven Linux Distributions Are Rising to Meet Growing Digital Fears

      August 8, 2025
      Recent

      Guardians of Privacy: How Security-Driven Linux Distributions Are Rising to Meet Growing Digital Fears

      August 8, 2025

      GNOME 48 Reimagined: Smoother Settings, Glorious HDR, and Precision Scaling

      August 8, 2025

      Microsoft Overhauls Windows 11’s Task Manager With Sleek New Look and Live Statistics

      August 8, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-37816 – Linux Kernel Mei VSC Buffer Overflow Vulnerability

    CVE-2025-37816 – Linux Kernel Mei VSC Buffer Overflow Vulnerability

    May 8, 2025

    CVE ID : CVE-2025-37816

    Published : May 8, 2025, 7:15 a.m. | 58 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    mei: vsc: Fix fortify-panic caused by invalid counted_by() use

    gcc 15 honors the __counted_by(len) attribute on vsc_tp_packet.buf[]
    and the vsc-tp.c code is using this in a wrong way. len does not contain
    the available size in the buffer, it contains the actual packet length
    *without* the crc. So as soon as vsc_tp_xfer() tries to add the crc to
    buf[] the fortify-panic handler gets triggered:

    [ 80.842193] memcpy: detected buffer overflow: 4 byte write of buffer size 0
    [ 80.842243] WARNING: CPU: 4 PID: 272 at lib/string_helpers.c:1032 __fortify_report+0x45/0x50
    …
    [ 80.843175] __fortify_panic+0x9/0xb
    [ 80.843186] vsc_tp_xfer.cold+0x67/0x67 [mei_vsc_hw]
    [ 80.843210] ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90
    [ 80.843229] ? lockdep_hardirqs_on+0x7c/0x110
    [ 80.843250] mei_vsc_hw_start+0x98/0x120 [mei_vsc]
    [ 80.843270] mei_reset+0x11d/0x420 [mei]

    The easiest fix would be to just drop the counted-by but with the exception
    of the ack buffer in vsc_tp_xfer_helper() which only contains enough room
    for the packet-header, all other uses of vsc_tp_packet always use a buffer
    of VSC_TP_MAX_XFER_SIZE bytes for the packet.

    Instead of just dropping the counted-by, split the vsc_tp_packet struct
    definition into a header and a full-packet definition and use a fixed
    size buf[] in the packet definition, this way fortify-source buffer
    overrun checking still works when enabled.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-37826 – Linux Kernel UFS SCSI Null Pointer Dereference Vulnerability
    Next Article CVE-2025-37817 – Linux kernel Double Free in Chameleon Driver

    Related Posts

    Development

    Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

    August 8, 2025
    Development

    Black Hat USA 2025: Policy compliance and the myth of the silver bullet

    August 8, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Word for the Web Finally Gets Proper Header and Footer Editing

    Operating Systems

    Laravel Seeder Generator

    Development

    CVE-2012-10053 – Apache Simple Web Server HTTP Header Buffer Overflow

    Common Vulnerabilities and Exposures (CVEs)

    Daiser partners with UK government’s EdgeAI hub

    News & Updates

    Highlights

    Windows 11 Pro vs Home vs Enterprise: Full Comparison

    July 4, 2025

    Choosing between Windows 11 Home, Pro, and Enterprise depends on your needs for features, security,…

    How to Sort Dates Efficiently in JavaScript

    May 30, 2025

    Target Concrete Score Matching: A Holistic Framework for Discrete Diffusion

    July 9, 2025

    Visa preps AI-ready credit cards for automated shopping transactions

    April 30, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.