Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      10 Ways Node.js Development Boosts AI & Real-Time Data (2025-2026 Edition)

      August 18, 2025

      Looking to Outsource React.js Development? Here’s What Top Agencies Are Doing Right

      August 18, 2025

      Beyond The Hype: What AI Can Really Do For Product Design

      August 18, 2025

      BrowserStack launches Chrome extension that bundles 10+ manual web testing tools

      August 18, 2025

      How much RAM does your Linux PC really need in 2025?

      August 19, 2025

      Have solar at home? Supercharge that investment with this other crucial component

      August 19, 2025

      I replaced my MacBook charger with this compact wall unit – and wish I’d done it sooner

      August 19, 2025

      5 reasons to switch to an immutable Linux distro today – and which to try first

      August 19, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Sentry Adds Logs Support for Laravel Apps

      August 19, 2025
      Recent

      Sentry Adds Logs Support for Laravel Apps

      August 19, 2025

      Efficient Context Management with Laravel’s Remember Functions

      August 19, 2025

      Laravel Devtoolbox: Your Swiss Army Knife Artisan CLI

      August 19, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      From plateau predictions to buggy rollouts — Bill Gates’ GPT-5 skepticism looks strangely accurate

      August 18, 2025
      Recent

      From plateau predictions to buggy rollouts — Bill Gates’ GPT-5 skepticism looks strangely accurate

      August 18, 2025

      We gave OpenAI’s open-source AI a kid’s test — here’s what happened

      August 18, 2025

      With GTA 6, next-gen exclusives, and a console comeback on the horizon, Xbox risks sitting on the sidelines — here’s why

      August 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38174 – “Thunderbolt: Double Dequeue Vulnerability”

    CVE-2025-38174 – “Thunderbolt: Double Dequeue Vulnerability”

    July 4, 2025

    CVE ID : CVE-2025-38174

    Published : July 4, 2025, 11:15 a.m. | 37 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    thunderbolt: Do not double dequeue a configuration request

    Some of our devices crash in tb_cfg_request_dequeue():

    general protection fault, probably for non-canonical address 0xdead000000000122

    CPU: 6 PID: 91007 Comm: kworker/6:2 Tainted: G U W 6.6.65
    RIP: 0010:tb_cfg_request_dequeue+0x2d/0xa0
    Call Trace:

    ? tb_cfg_request_dequeue+0x2d/0xa0
    tb_cfg_request_work+0x33/0x80
    worker_thread+0x386/0x8f0
    kthread+0xed/0x110
    ret_from_fork+0x38/0x50
    ret_from_fork_asm+0x1b/0x30

    The circumstances are unclear, however, the theory is that
    tb_cfg_request_work() can be scheduled twice for a request:
    first time via frame.callback from ring_work() and second
    time from tb_cfg_request(). Both times kworkers will execute
    tb_cfg_request_dequeue(), which results in double list_del()
    from the ctl->request_queue (the list poison deference hints
    at it: 0xdead000000000122).

    Do not dequeue requests that don’t have TB_CFG_REQUEST_ACTIVE
    bit set.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-38175 – Linux Kernel Binder UAF Vulnerability
    Next Article CVE-2025-5920 – WordPress Password Protected Posts Information Disclosure

    Related Posts

    Development

    Workday Staff Fall to Social Engineering; Hackers Access Third-Party CRM Platform

    August 18, 2025
    Development

    Get Ready for the Black Hat USA 2025 CISO Podcast Series from The Cyber Express and Suraksha Catalyst

    August 18, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    The surprising way ThredUp uses AI to sort 80,000 new items a day

    News & Updates

    How to Create Reusable Canva Templates for Your Brand

    Web Development

    Cisco waarschuwt voor kritiek Erlang/OTP SSH-lek in eigen producten

    Security

    CVE-2025-3961 – Withstars Books-Management-System Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    I replaced my MacBook charger with this compact wall unit – and wish I’d done it sooner

    August 19, 2025

    The Cuktech 15 is an ultraportable wall charger with four ports and a 140W output,…

    CVE-2025-46420 – Libsoup Memory Leak Vulnerability

    April 24, 2025

    These midrange Bose headphones are on sale for $130 off – act fast before the deal ends

    August 7, 2025

    WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately

    August 11, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.