๐Ÿ” CVE Alert

CVE-2025-37810

UNKNOWN 0.0

usb: dwc3: gadget: check that event count does not exceed event buffer length

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: check that event count does not exceed event buffer length The event count is read from register DWC3_GEVNTCOUNT. There is a check for the count being zero, but not for exceeding the event buffer length. Check that event count does not exceed event buffer length, avoiding an out-of-bounds access when memcpy'ing the event. Crash log: Unable to handle kernel paging request at virtual address ffffffc0129be000 pc : __memcpy+0x114/0x180 lr : dwc3_check_event_buf+0xec/0x348 x3 : 0000000000000030 x2 : 000000000000dfc4 x1 : ffffffc0129be000 x0 : ffffff87aad60080 Call trace: __memcpy+0x114/0x180 dwc3_interrupt+0x24/0x34

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 8, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
72246da40f3719af3bfd104a2365b32537c27d83 < 015c39f38e69a491d2abd5e98869a500a9459b3b 72246da40f3719af3bfd104a2365b32537c27d83 < b43225948b231b3f331194010f84512bee4d9f59 72246da40f3719af3bfd104a2365b32537c27d83 < c0079630f268843a25ed75226169cba40e0d8880 72246da40f3719af3bfd104a2365b32537c27d83 < a44547015287a19001384fe94dbff84c92ce4ee1 72246da40f3719af3bfd104a2365b32537c27d83 < c4d80e41cb42008dceb35e5dbf52574d93beac0d 72246da40f3719af3bfd104a2365b32537c27d83 < 52a7c9d930b95aa8b1620edaba4818040c32631f 72246da40f3719af3bfd104a2365b32537c27d83 < 99d655119b870ee60e4dbf310aa9a1ed8d9ede3d 72246da40f3719af3bfd104a2365b32537c27d83 < 63ccd26cd1f6600421795f6ca3e625076be06c9f
Linux / Linux
3.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/015c39f38e69a491d2abd5e98869a500a9459b3b git.kernel.org: https://git.kernel.org/stable/c/b43225948b231b3f331194010f84512bee4d9f59 git.kernel.org: https://git.kernel.org/stable/c/c0079630f268843a25ed75226169cba40e0d8880 git.kernel.org: https://git.kernel.org/stable/c/a44547015287a19001384fe94dbff84c92ce4ee1 git.kernel.org: https://git.kernel.org/stable/c/c4d80e41cb42008dceb35e5dbf52574d93beac0d git.kernel.org: https://git.kernel.org/stable/c/52a7c9d930b95aa8b1620edaba4818040c32631f git.kernel.org: https://git.kernel.org/stable/c/99d655119b870ee60e4dbf310aa9a1ed8d9ede3d git.kernel.org: https://git.kernel.org/stable/c/63ccd26cd1f6600421795f6ca3e625076be06c9f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html