Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      How To Prevent WordPress SQL Injection Attacks

      June 14, 2025

      This week in AI dev tools: Apple’s Foundations Model framework, Mistral’s first reasoning model, and more (June 13, 2025)

      June 13, 2025

      Open Talent platforms emerging to match skilled workers to needs, study finds

      June 13, 2025

      Java never goes out of style: Celebrating 30 years of the language

      June 12, 2025

      6 registry tweaks every tech-savvy user must apply on Windows 11

      June 14, 2025

      Here’s why network infrastructure is vital to maximizing your company’s AI adoption

      June 14, 2025

      The AI video tool behind the most viral social trends right now

      June 14, 2025

      Got a new password manager? How to clean up the password mess you left in the cloud

      June 14, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Right Invoicing App for iPhone: InvoiceTemple

      June 14, 2025
      Recent

      Right Invoicing App for iPhone: InvoiceTemple

      June 14, 2025

      Tunnel Run game in 170 lines of pure JS

      June 14, 2025

      Integrating Drupal with Salesforce SSO via SAML and Dynamic User Sync

      June 14, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Windows 11 24H2 tests toggle to turn off Recommended feed in the Start menu

      June 14, 2025
      Recent

      Windows 11 24H2 tests toggle to turn off Recommended feed in the Start menu

      June 14, 2025

      User calls Windows 11 “pure horror,” Microsoft says it’s listening to feedback

      June 14, 2025

      John the Ripper is an advanced offline password cracker

      June 14, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-50147 – Apache HTTP Server Denial of Service

    CVE-2025-50147 – Apache HTTP Server Denial of Service

    June 14, 2025

    CVE ID : CVE-2025-50147

    Published : June 14, 2025, 3:15 a.m. | 2 hours, 23 minutes ago

    Description : Rejected reason: Not used

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-50148 – Apache HTTP Server Unvalidated User Input
    Next Article CVE-2025-50146 – Apache HTTP Server Authentication Bypass

    Related Posts

    Development

    HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass

    June 14, 2025
    Development

    Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads

    June 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    GitHub Availability Report: May 2025

    News & Updates

    Linux Candy: Hidamari is fun video wallpaper for Linux

    Linux

    Xiaomi introduced MiMo-7B: A Compact Language Model that Outperforms Larger Models in Mathematical and Code Reasoning through Rigorous Pre-Training and Reinforcement Learning

    Machine Learning

    Google CEO says AGI is impossible with today’s tech, but Sam Altman claims “you’ll be happy to have a new device”

    News & Updates

    Highlights

    CVE-2024-58098 – Linux Kernel BPF Packet Pointer Invalidation Vulnerability

    May 5, 2025

    CVE ID : CVE-2024-58098

    Published : May 5, 2025, 3:15 p.m. | 18 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    bpf: track changes_pkt_data property for global functions

    When processing calls to certain helpers, verifier invalidates all
    packet pointers in a current state. For example, consider the
    following program:

    __attribute__((__noinline__))
    long skb_pull_data(struct __sk_buff *sk, __u32 len)
    {
    return bpf_skb_pull_data(sk, len);
    }

    SEC(“tc”)
    int test_invalidate_checks(struct __sk_buff *sk)
    {
    int *p = (void *)(long)sk->data;
    if ((void *)(p + 1) > (void *)(long)sk->data_end) return TCX_DROP;
    skb_pull_data(sk, 0);
    *p = 42;
    return TCX_PASS;
    }

    After a call to bpf_skb_pull_data() the pointer ‘p’ can’t be used
    safely. See function filter.c:bpf_helper_changes_pkt_data() for a list
    of such helpers.

    At the moment verifier invalidates packet pointers when processing
    helper function calls, and does not traverse global sub-programs when
    processing calls to global sub-programs. This means that calls to
    helpers done from global sub-programs do not invalidate pointers in
    the caller state. E.g. the program above is unsafe, but is not
    rejected by verifier.

    This commit fixes the omission by computing field
    bpf_subprog_info->changes_pkt_data for each sub-program before main
    verification pass.
    changes_pkt_data should be set if:
    – subprogram calls helper for which bpf_helper_changes_pkt_data
    returns true;
    – subprogram calls a global function,
    for which bpf_subprog_info->changes_pkt_data should be set.

    The verifier.c:check_cfg() pass is modified to compute this
    information. The commit relies on depth first instruction traversal
    done by check_cfg() and absence of recursive function calls:
    – check_cfg() would eventually visit every call to subprogram S in a
    state when S is fully explored;
    – when S is fully explored:
    – every direct helper call within S is explored
    (and thus changes_pkt_data is set if needed);
    – every call to subprogram S1 called by S was visited with S1 fully
    explored (and thus S inherits changes_pkt_data from S1).

    The downside of such approach is that dead code elimination is not
    taken into account: if a helper call inside global function is dead
    because of current configuration, verifier would conservatively assume
    that the call occurs for the purpose of the changes_pkt_data
    computation.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Tailwind CSS vs Bootstrap: A Side-by-Side Comparison

    April 24, 2025

    FaradaIC Sensors raises €4.5M for electrochemical gas detection tech

    April 7, 2025

    CVE-2025-4452 – D-Link DIR-619L Buffer Overflow Vulnerability

    May 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.