Advisory Published
Updated

CVE-2025-37882: usb: xhci: Fix isochronous Ring Underrun/Overrun event handling

First published: Fri May 09 2025(Updated: )

In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Fix isochronous Ring Underrun/Overrun event handling The TRB pointer of these events points at enqueue at the time of error occurrence on xHCI 1.1+ HCs or it's NULL on older ones. By the time we are handling the event, a new TD may be queued at this ring position. I can trigger this race by rising interrupt moderation to increase IRQ handling delay. Similar delay may occur naturally due to system load. If this ever happens after a Missed Service Error, missed TDs will be skipped and the new TD processed as if it matched the event. It could be given back prematurely, risking data loss or buffer UAF by the xHC. Don't complete TDs on xrun events and don't warn if queued TDs don't match the event's TRB pointer, which can be NULL or a link/no-op TRB. Don't warn if there are no queued TDs at all. Now that it's safe, also handle xrun events if the skip flag is clear. This ensures completion of any TD stuck in 'error mid TD' state right before the xrun event, which could happen if a driver submits a finite number of URBs to a buggy HC and then an error occurs on the last TD.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Linux Kernel

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-37882?

    CVE-2025-37882 has a severity rating that can vary based on the context of the affected systems, but it is considered a notable vulnerability in the Linux kernel.

  • How do I fix CVE-2025-37882?

    To fix CVE-2025-37882, update your Linux kernel to the latest stable version that includes the patch for this vulnerability.

  • What systems are affected by CVE-2025-37882?

    CVE-2025-37882 affects systems running various versions of the Linux kernel, especially those using xHCI 1.1+ host controllers.

  • What are the potential impacts of CVE-2025-37882?

    The potential impacts of CVE-2025-37882 include improper handling of isochronous Ring Underrun/Overrun events, which can lead to erratic USB device behavior.

  • Is there a workaround for CVE-2025-37882?

    While updating the kernel is the recommended solution for CVE-2025-37882, temporary mitigations may include disabling specific USB functionalities if applicable.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203