CVE-2025-37882 — Use After Free in Linux
CWE-416 — Use After FreeCWE-367 — Time-of-check Time-of-use (TOCTOU) Race Condition12 documents7 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 87.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 9
Latest updateJul 8
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: xhci: Fix isochronous Ring Underrun/Overrun event handling
The TRB pointer of these events points at enqueue at the time of error
occurrence on xHCI 1.1+ HCs or it's NULL on older ones. By the time we
are handling the event, a new TD may be queued at this ring position.
I can trigger this race by rising interrupt moderation to increase IRQ
handling delay. Similar delay may occur naturally due to system load.
If this eve…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages18 packages
Patches
🔴Vulnerability Details
5GHSA▶
GHSA-3qx6-96c8-pv99: In the Linux kernel, the following vulnerability has been resolved:
usb: xhci: Fix isochronous Ring Underrun/Overrun event handling
The TRB pointer↗2025-05-09
OSV▶
CVE-2025-37882: In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Fix isochronous Ring Underrun/Overrun event handling The TRB pointer of↗2025-05-09
📋Vendor Advisories
6Red Hat▶
kernel: Linux kernel: xHCI driver isochronous event handling race condition leading to data loss or UAF↗2025-05-09