CVE-2025-37813

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
08/05/2025
Last modified:
12/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: xhci: Fix invalid pointer dereference in Etron workaround<br /> <br /> This check is performed before prepare_transfer() and prepare_ring(), so<br /> enqueue can already point at the final link TRB of a segment. And indeed<br /> it will, some 0.4% of times this code is called.<br /> <br /> Then enqueue + 1 is an invalid pointer. It will crash the kernel right<br /> away or load some junk which may look like a link TRB and cause the real<br /> link TRB to be replaced with a NOOP. This wouldn&amp;#39;t end well.<br /> <br /> Use a functionally equivalent test which doesn&amp;#39;t dereference the pointer<br /> and always gives correct result.<br /> <br /> Something has crashed my machine twice in recent days while playing with<br /> an Etron HC, and a control transfer stress test ran for confirmation has<br /> just crashed it again. The same test passes with this patch applied.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.66 (including) 6.6.89 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.11.11 (including) 6.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.12.2 (including) 6.12.26 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.14.5 (excluding)
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*