Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The AI productivity paradox in software engineering: Balancing efficiency and human skill retention

      July 2, 2025

      The impact of gray work on software development

      July 2, 2025

      CSS Intelligence: Speculating On The Future Of A Smarter Language

      July 2, 2025

      Hallucinated code, real threat: How slopsquatting targets AI-assisted development

      July 1, 2025

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025

      Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

      July 2, 2025

      No, Microsoft and Xbox’s Phil Spencer isn’t stepping down any time soon — here’s the truth

      July 2, 2025

      Everwild’s cancellation has me worried for one of my favorite dev teams and Xbox itself — It needs creative new games to thrive and refresh its identity

      July 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Trust but Verify: The Curious Case of AI Hallucinations

      July 2, 2025
      Recent

      Trust but Verify: The Curious Case of AI Hallucinations

      July 2, 2025

      From Flow to Fabric: Connecting Power Automate to Microsoft Fabric

      July 2, 2025

      Flutter Web Hot Reload Has Landed – No More Refreshes!

      July 2, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025
      Recent

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025

      Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

      July 2, 2025

      No, Microsoft and Xbox’s Phil Spencer isn’t stepping down any time soon — here’s the truth

      July 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38169 – Linux Kernel ARM64 FPSIMD State Clobbering Vulnerability

    CVE-2025-38169 – Linux Kernel ARM64 FPSIMD State Clobbering Vulnerability

    July 3, 2025

    CVE ID : CVE-2025-38169

    Published : July 3, 2025, 9:15 a.m. | 2 hours, 14 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    arm64/fpsimd: Avoid clobbering kernel FPSIMD state with SMSTOP

    On system with SME, a thread’s kernel FPSIMD state may be erroneously
    clobbered during a context switch immediately after that state is
    restored. Systems without SME are unaffected.

    If the CPU happens to be in streaming SVE mode before a context switch
    to a thread with kernel FPSIMD state, fpsimd_thread_switch() will
    restore the kernel FPSIMD state using fpsimd_load_kernel_state() while
    the CPU is still in streaming SVE mode. When fpsimd_thread_switch()
    subsequently calls fpsimd_flush_cpu_state(), this will execute an
    SMSTOP, causing an exit from streaming SVE mode. The exit from
    streaming SVE mode will cause the hardware to reset a number of
    FPSIMD/SVE/SME registers, clobbering the FPSIMD state.

    Fix this by calling fpsimd_flush_cpu_state() before restoring the kernel
    FPSIMD state.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-38170 – Linux kernel – arm64 FPSIMD SME Trap Handling Stale CPU State Vulnerability
    Next Article CVE-2025-38167 – “NTFS3 Linux Kernel Null Pointer Dereference Vulnerability”

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-38153 – Allegro USB Network AQC111 Uninitialized Memory Access Vulnerability

    July 3, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-38151 – Linux Kernel RDMA cma: Work Queue Corruption Vulnerability

    July 3, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Microsoft Edge for Android may suggest SteamDB extension when visiting Steam

    Operating Systems

    Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery

    Development

    CVE-2025-5728 – SourceCodester Open Source Clinic Management System Unrestricted File Upload Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4955 – Tarteaucitron.io WordPress Stored Cross-site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-34037 – Linksys E-Series Router OS Command Injection Vulnerability

    June 23, 2025

    CVE ID : CVE-2025-34037

    Published : June 24, 2025, 1:15 a.m. | 46 minutes ago

    Description : An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability is exploited in the wild by the “TheMoon” worm to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. This vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

    June 11, 2025

    My top 7 rules that every PC build beginner should follow — saving time (and money)

    June 20, 2025

    Common eBay scams and how to avoid them

    April 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.