Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: An Echo In Here in here

      September 19, 2025

      How To Minimize The Environmental Impact Of Your Website

      September 19, 2025

      Progress adds AI coding assistance to Telerik and Kendo UI libraries

      September 19, 2025

      Wasm 3.0 standard is now officially complete

      September 19, 2025

      Development Release: Ubuntu 25.10 Beta

      September 18, 2025

      Development Release: Linux Mint 7 Beta “LMDE”

      September 18, 2025

      Distribution Release: Tails 7.0

      September 18, 2025

      Distribution Release: Security Onion 2.4.180

      September 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      GenStudio for Performance Marketing: What’s New and What We’ve Learned

      September 19, 2025
      Recent

      GenStudio for Performance Marketing: What’s New and What We’ve Learned

      September 19, 2025

      Agentic and Generative Commerce Can Elevate CX in B2B

      September 19, 2025

      AI Momentum and Perficient’s Inclusion in Analyst Reports – Highlights From 2025 So Far

      September 18, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Denmark’s Strategic Leap Replacing Microsoft Office 365 with LibreOffice for Digital Independence

      September 19, 2025
      Recent

      Denmark’s Strategic Leap Replacing Microsoft Office 365 with LibreOffice for Digital Independence

      September 19, 2025

      Development Release: Ubuntu 25.10 Beta

      September 18, 2025

      Development Release: Linux Mint 7 Beta “LMDE”

      September 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2022-50223 – LoongArch Linux Kernel CPUInfo Information Disclosure Vulnerability

    CVE-2022-50223 – LoongArch Linux Kernel CPUInfo Information Disclosure Vulnerability

    June 18, 2025

    CVE ID : CVE-2022-50223

    Published : June 18, 2025, 11:15 a.m. | 3 hours, 16 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    LoongArch: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK

    When CONFIG_CPUMASK_OFFSTACK and CONFIG_DEBUG_PER_CPU_MAPS is selected,
    cpu_max_bits_warn() generates a runtime warning similar as below while
    we show /proc/cpuinfo. Fix this by using nr_cpu_ids (the runtime limit)
    instead of NR_CPUS to iterate CPUs.

    [ 3.052463] ————[ cut here ]————
    [ 3.059679] WARNING: CPU: 3 PID: 1 at include/linux/cpumask.h:108 show_cpuinfo+0x5e8/0x5f0
    [ 3.070072] Modules linked in: efivarfs autofs4
    [ 3.076257] CPU: 0 PID: 1 Comm: systemd Not tainted 5.19-rc5+ #1052
    [ 3.084034] Hardware name: Loongson Loongson-3A5000-7A1000-1w-V0.1-CRB/Loongson-LS3A5000-7A1000-1w-EVB-V1.21, BIOS Loongson-UDK2018-V2.0.04082-beta7 04/27
    [ 3.099465] Stack : 9000000100157b08 9000000000f18530 9000000000cf846c 9000000100154000
    [ 3.109127] 9000000100157a50 0000000000000000 9000000100157a58 9000000000ef7430
    [ 3.118774] 90000001001578e8 0000000000000040 0000000000000020 ffffffffffffffff
    [ 3.128412] 0000000000aaaaaa 1ab25f00eec96a37 900000010021de80 900000000101c890
    [ 3.138056] 0000000000000000 0000000000000000 0000000000000000 0000000000aaaaaa
    [ 3.147711] ffff8000339dc220 0000000000000001 0000000006ab4000 0000000000000000
    [ 3.157364] 900000000101c998 0000000000000004 9000000000ef7430 0000000000000000
    [ 3.167012] 0000000000000009 000000000000006c 0000000000000000 0000000000000000
    [ 3.176641] 9000000000d3de08 9000000001639390 90000000002086d8 00007ffff0080286
    [ 3.186260] 00000000000000b0 0000000000000004 0000000000000000 0000000000071c1c
    [ 3.195868] …
    [ 3.199917] Call Trace:
    [ 3.203941] [] show_stack+0x38/0x14c
    [ 3.210666] [] dump_stack_lvl+0x60/0x88
    [ 3.217625] [] __warn+0xd0/0x100
    [ 3.223958] [] warn_slowpath_fmt+0x7c/0xcc
    [ 3.231150] [] show_cpuinfo+0x5e8/0x5f0
    [ 3.238080] [] seq_read_iter+0x354/0x4b4
    [ 3.245098] [] new_sync_read+0x17c/0x1c4
    [ 3.252114] [] vfs_read+0x138/0x1d0
    [ 3.258694] [] ksys_read+0x70/0x100
    [ 3.265265] [] do_syscall+0x7c/0x94
    [ 3.271820] [] handle_syscall+0xc4/0x160
    [ 3.281824] —[ end trace 8b484262b4b8c24c ]—

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2022-50224 – “KVM: AMD SVM NX Bit Validation Vulnerability”
    Next Article CVE-2022-50222 – Linux Kernel TTY Unicode Screen Buffer Info Leak

    Related Posts

    Development

    Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

    September 14, 2025
    Development

    Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

    September 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-4291 – IdeaCMS Unrestricted File Upload Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    dano – hashdeep/md5tree for media files

    Linux

    CVE-2025-55013 – Assemblyline 4 Service Client Path Traversal Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Agent-Based Debugging Gets a Cost-Effective Alternative: Salesforce AI Presents SWERank for Accurate and Scalable Software Issue Localization

    Machine Learning

    Highlights

    CVE-2025-47270 – Nimiq Albatross Denial of Service Buffer Overflow

    May 12, 2025

    CVE ID : CVE-2025-47270

    Published : May 12, 2025, 11:15 a.m. | 1 hour, 25 minutes ago

    Description : nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. The `nimiq-network-libp2p` subcrate of nimiq/core-rs-albatross is vulnerable to a Denial of Service (DoS) attack due to uncontrolled memory allocation. Specifically, the implementation of the `Discovery` network message handling allocates a buffer based on a length value provided by the peer, without enforcing an upper bound. Since this length is a `u32`, a peer can trigger allocations of up to 4 GB, potentially leading to memory exhaustion and node crashes. As Discovery messages are regularly exchanged for peer discovery, this vulnerability can be exploited repeatedly. The patch for this vulnerability is formally released as part of v1.1.0. The patch implements a limit to the discovery message size of 1 MB and also resizes the message buffer size incrementally as the data is read. No known workarounds are available.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Asus echoes Microsoft, says dump Windows 10 for Windows 11 ASAP

    June 1, 2025

    Rogue Trader continues to be one of the best Warhammer 40,000 games of all time — thanks to this second DLC expansion

    June 24, 2025

    CVE-2025-7370 – Libsoup Cookie Parsing NULL Pointer Dereference Vulnerability

    July 10, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.