๐Ÿ” CVE Alert

CVE-2025-37812

UNKNOWN 0.0

usb: cdns3: Fix deadlock when using NCM gadget

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: cdns3: Fix deadlock when using NCM gadget The cdns3 driver has the same NCM deadlock as fixed in cdnsp by commit 58f2fcb3a845 ("usb: cdnsp: Fix deadlock issue during using NCM gadget"). Under PREEMPT_RT the deadlock can be readily triggered by heavy network traffic, for example using "iperf --bidir" over NCM ethernet link. The deadlock occurs because the threaded interrupt handler gets preempted by a softirq, but both are protected by the same spinlock. Prevent deadlock by disabling softirq during threaded irq handler.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 8, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7733f6c32e36ff9d7adadf40001039bf219b1cbe < eebfb64c624fc738b669100173344fb441c5e719 7733f6c32e36ff9d7adadf40001039bf219b1cbe < 59a760e4796a3cd88d8b9d7706e0a638de677751 7733f6c32e36ff9d7adadf40001039bf219b1cbe < b96239582531775f2fdcb14de29bdb6870fd4c8c 7733f6c32e36ff9d7adadf40001039bf219b1cbe < c27db84ed44e50ff90d9e3a2a25fae2e0a0fa015 7733f6c32e36ff9d7adadf40001039bf219b1cbe < 48a62deb857f0694f611949015e70ad194d97159 7733f6c32e36ff9d7adadf40001039bf219b1cbe < 74cd6e408a4c010e404832f0e4609d29bf1d0c41 7733f6c32e36ff9d7adadf40001039bf219b1cbe < 09e90a9689a4aac7a2f726dc2aa472b0b37937b7 7733f6c32e36ff9d7adadf40001039bf219b1cbe < a1059896f2bfdcebcdc7153c3be2307ea319501f
Linux / Linux
5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/eebfb64c624fc738b669100173344fb441c5e719 git.kernel.org: https://git.kernel.org/stable/c/59a760e4796a3cd88d8b9d7706e0a638de677751 git.kernel.org: https://git.kernel.org/stable/c/b96239582531775f2fdcb14de29bdb6870fd4c8c git.kernel.org: https://git.kernel.org/stable/c/c27db84ed44e50ff90d9e3a2a25fae2e0a0fa015 git.kernel.org: https://git.kernel.org/stable/c/48a62deb857f0694f611949015e70ad194d97159 git.kernel.org: https://git.kernel.org/stable/c/74cd6e408a4c010e404832f0e4609d29bf1d0c41 git.kernel.org: https://git.kernel.org/stable/c/09e90a9689a4aac7a2f726dc2aa472b0b37937b7 git.kernel.org: https://git.kernel.org/stable/c/a1059896f2bfdcebcdc7153c3be2307ea319501f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html