Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      10 Ways Node.js Development Boosts AI & Real-Time Data (2025-2026 Edition)

      August 18, 2025

      Looking to Outsource React.js Development? Here’s What Top Agencies Are Doing Right

      August 18, 2025

      Beyond The Hype: What AI Can Really Do For Product Design

      August 18, 2025

      BrowserStack launches Chrome extension that bundles 10+ manual web testing tools

      August 18, 2025

      How much RAM does your Linux PC really need in 2025?

      August 19, 2025

      Have solar at home? Supercharge that investment with this other crucial component

      August 19, 2025

      I replaced my MacBook charger with this compact wall unit – and wish I’d done it sooner

      August 19, 2025

      5 reasons to switch to an immutable Linux distro today – and which to try first

      August 19, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Sentry Adds Logs Support for Laravel Apps

      August 19, 2025
      Recent

      Sentry Adds Logs Support for Laravel Apps

      August 19, 2025

      Efficient Context Management with Laravel’s Remember Functions

      August 19, 2025

      Laravel Devtoolbox: Your Swiss Army Knife Artisan CLI

      August 19, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      From plateau predictions to buggy rollouts — Bill Gates’ GPT-5 skepticism looks strangely accurate

      August 18, 2025
      Recent

      From plateau predictions to buggy rollouts — Bill Gates’ GPT-5 skepticism looks strangely accurate

      August 18, 2025

      We gave OpenAI’s open-source AI a kid’s test — here’s what happened

      August 18, 2025

      With GTA 6, next-gen exclusives, and a console comeback on the horizon, Xbox risks sitting on the sidelines — here’s why

      August 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38233 – Linux kernel Powerpc64 Ftrace Livepatching R15 Clobbered Vulnerability

    CVE-2025-38233 – Linux kernel Powerpc64 Ftrace Livepatching R15 Clobbered Vulnerability

    July 4, 2025

    CVE ID : CVE-2025-38233

    Published : July 4, 2025, 2:15 p.m. | 4 hours, 57 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    powerpc64/ftrace: fix clobbered r15 during livepatching

    While r15 is clobbered always with PPC_FTRACE_OUT_OF_LINE, it is
    not restored in livepatch sequence leading to not so obvious fails
    like below:

    BUG: Unable to handle kernel data access on write at 0xc0000000000f9078
    Faulting instruction address: 0xc0000000018ff958
    Oops: Kernel access of bad area, sig: 11 [#1]
    …
    NIP: c0000000018ff958 LR: c0000000018ff930 CTR: c0000000009c0790
    REGS: c00000005f2e7790 TRAP: 0300 Tainted: G K (6.14.0+)
    MSR: 8000000000009033 CR: 2822880b XER: 20040000
    CFAR: c0000000008addc0 DAR: c0000000000f9078 DSISR: 0a000000 IRQMASK: 1
    GPR00: c0000000018f2584 c00000005f2e7a30 c00000000280a900 c000000017ffa488
    GPR04: 0000000000000008 0000000000000000 c0000000018f24fc 000000000000000d
    GPR08: fffffffffffe0000 000000000000000d 0000000000000000 0000000000008000
    GPR12: c0000000009c0790 c000000017ffa480 c00000005f2e7c78 c0000000000f9070
    GPR16: c00000005f2e7c90 0000000000000000 0000000000000000 0000000000000000
    GPR20: 0000000000000000 c00000005f3efa80 c00000005f2e7c60 c00000005f2e7c88
    GPR24: c00000005f2e7c60 0000000000000001 c0000000000f9078 0000000000000000
    GPR28: 00007fff97960000 c000000017ffa480 0000000000000000 c0000000000f9078
    …
    Call Trace:
    check_heap_object+0x34/0x390 (unreliable)
    __mutex_unlock_slowpath.isra.0+0xe4/0x230
    seq_read_iter+0x430/0xa90
    proc_reg_read_iter+0xa4/0x200
    vfs_read+0x41c/0x510
    ksys_read+0xa4/0x190
    system_call_exception+0x1d0/0x440
    system_call_vectored_common+0x15c/0x2ec

    Fix it by restoring r15 always.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-38230 – Linux JFS Shift Out of Bounds Vulnerability
    Next Article CVE-2025-38227 – Linux Vidtv Slab Use-After-Free Vulnerability

    Related Posts

    Development

    Workday Staff Fall to Social Engineering; Hackers Access Third-Party CRM Platform

    August 18, 2025
    Development

    Get Ready for the Black Hat USA 2025 CISO Podcast Series from The Cyber Express and Suraksha Catalyst

    August 18, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Firefox 141.0.2 update targets NVIDIA crash, dev tools issue & more

    Operating Systems

    Simplify your accounting, GST invoicing, and inventory management with GSTMate – your all-in-one desktop GST solution from Apptrop.

    Web Development

    CVE-2025-5265 – “Firefox Windows Local Code Execution Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-5858 – PHPGurukul Nipah Virus Testing Management System SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-31701 – Dahua Network Device Buffer Overflow Vulnerability

    July 23, 2025

    CVE ID : CVE-2025-31701

    Published : July 23, 2025, 7:15 a.m. | 17 hours, 14 minutes ago

    Description : A vulnerability has been found in Dahua products.

    Attackers could exploit a buffer overflow vulnerability by sending specially crafted malicious packets, potentially causing service disruption (e.g., crashes) or remote code execution (RCE). Some devices may have deployed protection mechanisms such as Address Space Layout Randomization (ASLR), which reduces the likelihood of successful RCE exploitation. However, denial-of-service (DoS) attacks remain a concern.

    Severity: 8.1 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Azure AI just made GPT-4.1 fine-tuning faster and more accessible

    July 8, 2025

    New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains

    June 18, 2025

    Q&A: A roadmap for revolutionizing health care through data-driven innovation

    May 5, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.