๐Ÿ” CVE Alert

CVE-2025-38376

UNKNOWN 0.0

usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume Shawn and John reported a hang issue during system suspend as below: - USB gadget is enabled as Ethernet - There is data transfer over USB Ethernet (scp a big file between host and device) - Device is going in/out suspend (echo mem > /sys/power/state) The root cause is the USB device controller is suspended but the USB bus is still active which caused the USB host continues to transfer data with device and the device continues to queue USB requests (in this case, a delayed TCP ACK packet trigger the issue) after controller is suspended, however the USB controller clock is already gated off. Then if udc driver access registers after that point, the system will hang. The correct way to avoid such issue is to disconnect device from host when the USB bus is not at suspend state. Then the host will receive disconnect event and stop data transfer in time. To continue make USB gadget device work after system resume, this will reconnect device automatically. To make usb wakeup work if USB bus is already at suspend state, this will keep connection for it only when USB device controller has enabled wakeup capability.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 25, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
235ffc17d0146d806f6ad8c094c24ff4878f2edb < 937f49be49d6ee696eb5457c21ff89c135c9b5ae 235ffc17d0146d806f6ad8c094c24ff4878f2edb < c68a27bbebbdb4e0ccd45d4f0df7111a09ddac24 235ffc17d0146d806f6ad8c094c24ff4878f2edb < 5fd585fedb79bac2af9976b0fa3ffa354f0cc0bb 235ffc17d0146d806f6ad8c094c24ff4878f2edb < 31a6afbe86e8e9deba9ab53876ec49eafc7fd901
Linux / Linux
6.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/937f49be49d6ee696eb5457c21ff89c135c9b5ae git.kernel.org: https://git.kernel.org/stable/c/c68a27bbebbdb4e0ccd45d4f0df7111a09ddac24 git.kernel.org: https://git.kernel.org/stable/c/5fd585fedb79bac2af9976b0fa3ffa354f0cc0bb git.kernel.org: https://git.kernel.org/stable/c/31a6afbe86e8e9deba9ab53876ec49eafc7fd901