First published: Thu May 08 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Fix invalid pointer dereference in Etron workaround This check is performed before prepare_transfer() and prepare_ring(), so enqueue can already point at the final link TRB of a segment. And indeed it will, some 0.4% of times this code is called. Then enqueue + 1 is an invalid pointer. It will crash the kernel right away or load some junk which may look like a link TRB and cause the real link TRB to be replaced with a NOOP. This wouldn't end well. Use a functionally equivalent test which doesn't dereference the pointer and always gives correct result. Something has crashed my machine twice in recent days while playing with an Etron HC, and a control transfer stress test ran for confirmation has just crashed it again. The same test passes with this patch applied.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37813 has been classified as a medium severity vulnerability in the Linux kernel.
CVE-2025-37813 is caused by an invalid pointer dereference in the USB xHCI driver related to Etron workarounds.
To fix CVE-2025-37813, upgrade to the patched version of the Linux kernel where this vulnerability has been resolved.
CVE-2025-37813 affects multiple versions of the Linux kernel; review your installed version for vulnerabilities.
As of now, there are no reported cases of CVE-2025-37813 being actively exploited in the wild.