Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Psychology Of Color In UX Design And Digital Products

      August 15, 2025

      This week in AI dev tools: Claude Sonnet 4’s larger context window, ChatGPT updates, and more (August 15, 2025)

      August 15, 2025

      Sentry launches MCP monitoring tool

      August 14, 2025

      10 Benefits of Hiring a React.js Development Company (2025–2026 Edition)

      August 13, 2025

      Your smart home device just got a performance and security boost for free

      August 18, 2025

      Ultrahuman brings advanced cycle and ovulation tracking to its smart ring

      August 18, 2025

      DistroWatch Weekly, Issue 1135

      August 17, 2025

      14 secret phone codes that unlock hidden features on your Android and iPhone

      August 17, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Air Quality Prediction System using Python ML

      August 17, 2025
      Recent

      Air Quality Prediction System using Python ML

      August 17, 2025

      AI’s Hidden Thirst: The Water Behind Tech

      August 16, 2025

      Minesweeper game in 100 lines of pure JavaScript – easy tutorial

      August 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      DistroWatch Weekly, Issue 1135

      August 17, 2025
      Recent

      DistroWatch Weekly, Issue 1135

      August 17, 2025

      Ubuntu’s New “Dangerous” Daily Builds – What Are They?

      August 17, 2025

      gofmt – formats Go programs

      August 17, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38172 – “Linux EROFS UAF Vulnerability”

    CVE-2025-38172 – “Linux EROFS UAF Vulnerability”

    July 3, 2025

    CVE ID : CVE-2025-38172

    Published : July 3, 2025, 9:15 a.m. | 2 hours, 14 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    erofs: avoid using multiple devices with different type

    For multiple devices, both primary and extra devices should be the
    same type. `erofs_init_device` has already guaranteed that if the
    primary is a file-backed device, extra devices should also be
    regular files.

    However, if the primary is a block device while the extra device
    is a file-backed device, `erofs_init_device` will get an ENOTBLK,
    which is not treated as an error in `erofs_fc_get_tree`, and that
    leads to an UAF:

    erofs_fc_get_tree
    get_tree_bdev_flags(erofs_fc_fill_super)
    erofs_read_superblock
    erofs_init_device // sbi->dif0 is not inited yet,
    // return -ENOTBLK
    deactivate_locked_super
    free(sbi)
    if (err is -ENOTBLK)
    sbi->dif0.file = filp_open() // sbi UAF

    So if -ENOTBLK is hitted in `erofs_init_device`, it means the
    primary device must be a block device, and the extra device
    is not a block device. The error can be converted to -EINVAL.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-38166 – Linux Kernel BPF ktls Panic Vulnerability
    Next Article CVE-2025-38171 – Linux Power Supply Driver Max77705 Workqueue Vulnerability

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-9090 – Tenda Telnet Service Command Injection

    August 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-9091 – Tenda AC20 Hard-Coded Credentials Vulnerability

    August 17, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Now everybody but Citrix agrees that CitrixBleed 2 is under exploit

    Security

    Le notizie minori del mondo GNU/Linux e dintorni della settimana nr 22/2025

    Linux

    TikTok adds X-style community notes – here’s how you can apply

    News & Updates

    Why Whoop’s policy change has fans fuming

    News & Updates

    Highlights

    cxt – extract and aggregate project context

    August 9, 2025

    cxt is a command-line tool that aggregates file and directory contents into your clipboard. The…

    CVE-2025-47094 – Adobe Experience Manager Reflected Cross-Site Scripting (XSS)

    June 10, 2025

    Top Benefits of Outsourcing React Native App Development🌍

    April 14, 2025

    Europol targets Kremlin-backed cybercrime gang NoName057(16)

    July 21, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.