CVE-2025-37812

In the Linux kernel, the following vulnerability has been resolved: usb: cdns3: Fix deadlock when using NCM gadget The cdns3 driver has the same NCM deadlock as fixed in cdnsp by commit 58f2fcb3a845 ("usb: cdnsp: Fix deadlock issue during using NCM gadget"). Under PREEMPT_RT the deadlock can be readily triggered by heavy network traffic, for example using "iperf --bidir" over NCM ethernet link. The deadlock occurs because the threaded interrupt handler gets preempted by a softirq, but both are protected by the same spinlock. Prevent deadlock by disabling softirq during threaded irq handler.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

12 Nov 2025, 21:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-667
First Time Linux linux Kernel
Debian
Debian debian Linux
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/09e90a9689a4aac7a2f726dc2aa472b0b37937b7 - () https://git.kernel.org/stable/c/09e90a9689a4aac7a2f726dc2aa472b0b37937b7 - Patch
References () https://git.kernel.org/stable/c/48a62deb857f0694f611949015e70ad194d97159 - () https://git.kernel.org/stable/c/48a62deb857f0694f611949015e70ad194d97159 - Patch
References () https://git.kernel.org/stable/c/59a760e4796a3cd88d8b9d7706e0a638de677751 - () https://git.kernel.org/stable/c/59a760e4796a3cd88d8b9d7706e0a638de677751 - Patch
References () https://git.kernel.org/stable/c/74cd6e408a4c010e404832f0e4609d29bf1d0c41 - () https://git.kernel.org/stable/c/74cd6e408a4c010e404832f0e4609d29bf1d0c41 - Patch
References () https://git.kernel.org/stable/c/a1059896f2bfdcebcdc7153c3be2307ea319501f - () https://git.kernel.org/stable/c/a1059896f2bfdcebcdc7153c3be2307ea319501f - Patch
References () https://git.kernel.org/stable/c/b96239582531775f2fdcb14de29bdb6870fd4c8c - () https://git.kernel.org/stable/c/b96239582531775f2fdcb14de29bdb6870fd4c8c - Patch
References () https://git.kernel.org/stable/c/c27db84ed44e50ff90d9e3a2a25fae2e0a0fa015 - () https://git.kernel.org/stable/c/c27db84ed44e50ff90d9e3a2a25fae2e0a0fa015 - Patch
References () https://git.kernel.org/stable/c/eebfb64c624fc738b669100173344fb441c5e719 - () https://git.kernel.org/stable/c/eebfb64c624fc738b669100173344fb441c5e719 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List, Third Party Advisory

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

Information

Published : 2025-05-08 07:15

Updated : 2025-11-12 21:39


NVD link : CVE-2025-37812

Mitre link : CVE-2025-37812

CVE.ORG link : CVE-2025-37812


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-667

Improper Locking