CVE-2025-37813

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-37813
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-37813.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-37813
Downstream
Related
Published
2025-05-08T07:15:52Z
Modified
2025-05-13T10:00:04Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Fix invalid pointer dereference in Etron workaround

This check is performed before preparetransfer() and preparering(), so enqueue can already point at the final link TRB of a segment. And indeed it will, some 0.4% of times this code is called.

Then enqueue + 1 is an invalid pointer. It will crash the kernel right away or load some junk which may look like a link TRB and cause the real link TRB to be replaced with a NOOP. This wouldn't end well.

Use a functionally equivalent test which doesn't dereference the pointer and always gives correct result.

Something has crashed my machine twice in recent days while playing with an Etron HC, and a control transfer stress test ran for confirmation has just crashed it again. The same test passes with this patch applied.

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.27-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}