Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 20, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 20, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 20, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 20, 2025

      Helldivers 2: Heart of Democracy update is live, and you need to jump in to save Super Earth from the Illuminate

      May 20, 2025

      Qualcomm’s new Adreno Control Panel will let you fine-tune the GPU for certain games on Snapdragon X Elite devices

      May 20, 2025

      Samsung takes on LG’s best gaming TVs — adds NVIDIA G-SYNC support to 2025 flagship

      May 20, 2025

      The biggest unanswered questions about Xbox’s next-gen consoles

      May 20, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      HCL Commerce V9.1 – The Power of HCL Commerce Search

      May 20, 2025
      Recent

      HCL Commerce V9.1 – The Power of HCL Commerce Search

      May 20, 2025

      Community News: Latest PECL Releases (05.20.2025)

      May 20, 2025

      Getting Started with Personalization in Sitecore XM Cloud: Enable, Extend, and Execute

      May 20, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Helldivers 2: Heart of Democracy update is live, and you need to jump in to save Super Earth from the Illuminate

      May 20, 2025
      Recent

      Helldivers 2: Heart of Democracy update is live, and you need to jump in to save Super Earth from the Illuminate

      May 20, 2025

      Qualcomm’s new Adreno Control Panel will let you fine-tune the GPU for certain games on Snapdragon X Elite devices

      May 20, 2025

      Samsung takes on LG’s best gaming TVs — adds NVIDIA G-SYNC support to 2025 flagship

      May 20, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-37816 – Linux Kernel Mei VSC Buffer Overflow Vulnerability

    CVE-2025-37816 – Linux Kernel Mei VSC Buffer Overflow Vulnerability

    May 8, 2025

    CVE ID : CVE-2025-37816

    Published : May 8, 2025, 7:15 a.m. | 58 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    mei: vsc: Fix fortify-panic caused by invalid counted_by() use

    gcc 15 honors the __counted_by(len) attribute on vsc_tp_packet.buf[]
    and the vsc-tp.c code is using this in a wrong way. len does not contain
    the available size in the buffer, it contains the actual packet length
    *without* the crc. So as soon as vsc_tp_xfer() tries to add the crc to
    buf[] the fortify-panic handler gets triggered:

    [ 80.842193] memcpy: detected buffer overflow: 4 byte write of buffer size 0
    [ 80.842243] WARNING: CPU: 4 PID: 272 at lib/string_helpers.c:1032 __fortify_report+0x45/0x50
    …
    [ 80.843175] __fortify_panic+0x9/0xb
    [ 80.843186] vsc_tp_xfer.cold+0x67/0x67 [mei_vsc_hw]
    [ 80.843210] ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90
    [ 80.843229] ? lockdep_hardirqs_on+0x7c/0x110
    [ 80.843250] mei_vsc_hw_start+0x98/0x120 [mei_vsc]
    [ 80.843270] mei_reset+0x11d/0x420 [mei]

    The easiest fix would be to just drop the counted-by but with the exception
    of the ack buffer in vsc_tp_xfer_helper() which only contains enough room
    for the packet-header, all other uses of vsc_tp_packet always use a buffer
    of VSC_TP_MAX_XFER_SIZE bytes for the packet.

    Instead of just dropping the counted-by, split the vsc_tp_packet struct
    definition into a header and a full-packet definition and use a fixed
    size buf[] in the packet definition, this way fortify-source buffer
    overrun checking still works when enabled.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-37826 – Linux Kernel UFS SCSI Null Pointer Dereference Vulnerability
    Next Article CVE-2025-37817 – Linux kernel Double Free in Chameleon Driver

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 21, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-5011 – MoonlightL Hexo-Boot Cross-Site Scripting Vulnerability

    May 21, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Automatic Relation Loading in Laravel 12.8

    Automatic Relation Loading in Laravel 12.8

    Development

    How *do* you break down a large project?

    Learning Resources

    Enhancing Language Model Performance and Diversity Through Multiagent Fine-Tuning

    Machine Learning

    Samsung’s new Odyssey OLED G6 500Hz monitor is a gamer’s paradise

    Operating Systems

    Highlights

    cheatshh – CLI tool to store commands

    January 27, 2025

    cheatshh is an interactive CLI meant for managing command line cheatsheets, written in shell script.…

    Sopht raises €3.3M for energy reduction SaaS

    June 4, 2024

    CISA Rolls Out Next-Gen Learning Platform to Boost Cybersecurity Skills

    November 19, 2024

    Achieving Critical Reliability in Instruction-Following with LLMs: How to Achieve AI Customer Service That’s 100% Reliable

    March 23, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.