CVE-2025-37810

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: check that event count does not exceed event buffer length The event count is read from register DWC3_GEVNTCOUNT. There is a check for the count being zero, but not for exceeding the event buffer length. Check that event count does not exceed event buffer length, avoiding an out-of-bounds access when memcpy'ing the event. Crash log: Unable to handle kernel paging request at virtual address ffffffc0129be000 pc : __memcpy+0x114/0x180 lr : dwc3_check_event_buf+0xec/0x348 x3 : 0000000000000030 x2 : 000000000000dfc4 x1 : ffffffc0129be000 x0 : ffffff87aad60080 Call trace: __memcpy+0x114/0x180 dwc3_interrupt+0x24/0x34
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

12 Nov 2025, 21:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/015c39f38e69a491d2abd5e98869a500a9459b3b - () https://git.kernel.org/stable/c/015c39f38e69a491d2abd5e98869a500a9459b3b - Patch
References () https://git.kernel.org/stable/c/52a7c9d930b95aa8b1620edaba4818040c32631f - () https://git.kernel.org/stable/c/52a7c9d930b95aa8b1620edaba4818040c32631f - Patch
References () https://git.kernel.org/stable/c/63ccd26cd1f6600421795f6ca3e625076be06c9f - () https://git.kernel.org/stable/c/63ccd26cd1f6600421795f6ca3e625076be06c9f - Patch
References () https://git.kernel.org/stable/c/99d655119b870ee60e4dbf310aa9a1ed8d9ede3d - () https://git.kernel.org/stable/c/99d655119b870ee60e4dbf310aa9a1ed8d9ede3d - Patch
References () https://git.kernel.org/stable/c/a44547015287a19001384fe94dbff84c92ce4ee1 - () https://git.kernel.org/stable/c/a44547015287a19001384fe94dbff84c92ce4ee1 - Patch
References () https://git.kernel.org/stable/c/b43225948b231b3f331194010f84512bee4d9f59 - () https://git.kernel.org/stable/c/b43225948b231b3f331194010f84512bee4d9f59 - Patch
References () https://git.kernel.org/stable/c/c0079630f268843a25ed75226169cba40e0d8880 - () https://git.kernel.org/stable/c/c0079630f268843a25ed75226169cba40e0d8880 - Patch
References () https://git.kernel.org/stable/c/c4d80e41cb42008dceb35e5dbf52574d93beac0d - () https://git.kernel.org/stable/c/c4d80e41cb42008dceb35e5dbf52574d93beac0d - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List, Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

08 May 2025, 14:39

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: dwc3: gadget: comprobar que el recuento de eventos no supere la longitud del búfer de eventos. El recuento de eventos se lee del registro DWC3_GEVNTCOUNT. Se comprueba que el recuento sea cero, pero no que supere la longitud del búfer de eventos. Se comprueba que el recuento de eventos no supere la longitud del búfer de eventos, lo que evita un acceso fuera de los límites al copiar el evento a memoria. Registro de fallos: No se puede gestionar la solicitud de paginación del núcleo en la dirección virtual ffffffc0129be000 pc : __memcpy+0x114/0x180 lr : dwc3_check_event_buf+0xec/0x348 x3 : 0000000000000030 x2 : 000000000000dfc4 x1 : ffffffc0129be000 x0 : ffffff87aad60080 Rastreo de llamadas: __memcpy+0x114/0x180 dwc3_interrupt+0x24/0x34

08 May 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-08 07:15

Updated : 2025-11-12 21:40


NVD link : CVE-2025-37810

Mitre link : CVE-2025-37810

CVE.ORG link : CVE-2025-37810


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write