Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38233 – Linux kernel Powerpc64 Ftrace Livepatching R15 Clobbered Vulnerability

    CVE-2025-38233 – Linux kernel Powerpc64 Ftrace Livepatching R15 Clobbered Vulnerability

    July 4, 2025

    CVE ID : CVE-2025-38233

    Published : July 4, 2025, 2:15 p.m. | 4 hours, 57 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    powerpc64/ftrace: fix clobbered r15 during livepatching

    While r15 is clobbered always with PPC_FTRACE_OUT_OF_LINE, it is
    not restored in livepatch sequence leading to not so obvious fails
    like below:

    BUG: Unable to handle kernel data access on write at 0xc0000000000f9078
    Faulting instruction address: 0xc0000000018ff958
    Oops: Kernel access of bad area, sig: 11 [#1]
    …
    NIP: c0000000018ff958 LR: c0000000018ff930 CTR: c0000000009c0790
    REGS: c00000005f2e7790 TRAP: 0300 Tainted: G K (6.14.0+)
    MSR: 8000000000009033 CR: 2822880b XER: 20040000
    CFAR: c0000000008addc0 DAR: c0000000000f9078 DSISR: 0a000000 IRQMASK: 1
    GPR00: c0000000018f2584 c00000005f2e7a30 c00000000280a900 c000000017ffa488
    GPR04: 0000000000000008 0000000000000000 c0000000018f24fc 000000000000000d
    GPR08: fffffffffffe0000 000000000000000d 0000000000000000 0000000000008000
    GPR12: c0000000009c0790 c000000017ffa480 c00000005f2e7c78 c0000000000f9070
    GPR16: c00000005f2e7c90 0000000000000000 0000000000000000 0000000000000000
    GPR20: 0000000000000000 c00000005f3efa80 c00000005f2e7c60 c00000005f2e7c88
    GPR24: c00000005f2e7c60 0000000000000001 c0000000000f9078 0000000000000000
    GPR28: 00007fff97960000 c000000017ffa480 0000000000000000 c0000000000f9078
    …
    Call Trace:
    check_heap_object+0x34/0x390 (unreliable)
    __mutex_unlock_slowpath.isra.0+0xe4/0x230
    seq_read_iter+0x430/0xa90
    proc_reg_read_iter+0xa4/0x200
    vfs_read+0x41c/0x510
    ksys_read+0xa4/0x190
    system_call_exception+0x1d0/0x440
    system_call_vectored_common+0x15c/0x2ec

    Fix it by restoring r15 always.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-38230 – Linux JFS Shift Out of Bounds Vulnerability
    Next Article CVE-2025-38227 – Linux Vidtv Slab Use-After-Free Vulnerability

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-44658 – Netgear RAX30 PHP-FPM Misconfigured Extension Bypass Vulnerability

    July 22, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-7393 – Drupal Mail Login Authentication Bypass

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Identity theft – six tips to help keep yours safe

    Development

    The top 10 products our readers bought for Prime Day (no. 1 surprised us)

    News & Updates

    Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks

    Development

    CVE-2025-22882 – Delta Electronics ISPSoft Buffer Overflow

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2024-54189 – Parallels Desktop for Mac Root Privilege Escalation

    June 3, 2025

    CVE ID : CVE-2024-54189

    Published : June 3, 2025, 10:15 a.m. | 1 hour, 13 minutes ago

    Description : A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation.

    Severity: 7.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Cost and Features to Build Your Own AI Yoga App

    July 17, 2025

    ‘I don’t know if it can be saved’ — Civilization 7 is in trouble as it drops to a Mostly Negative rating on Steam

    June 3, 2025

    ‘Critical Security Updates’ cancelled for 939 million Android users

    April 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.