CVE-2025-37810
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-37810 was disclosed on May 8, 2025, affecting the Linux kernel's USB DWC3 gadget driver. The vulnerability involves an event count validation issue where there is a check for the count being zero, but not for exceeding the event buffer length (NVD).

Technical details

The vulnerability exists in the DWC3_GEVNTCOUNT register handling where the event count is read but not properly validated against the event buffer length. While there is a check for the count being zero, there is no verification that the count doesn't exceed the buffer length, potentially leading to an out-of-bounds memory access during memcpy operations (Wiz).

Impact

The vulnerability can result in a kernel paging request failure and system crash, as evidenced by the crash log showing an inability to handle kernel paging requests at virtual address ffffffc0129be000. This occurs during the memcpy operation in the dwc3checkevent_buf function (NVD).

Mitigation and workarounds

The vulnerability has been patched in the Linux kernel through a fix that implements proper event count validation against the event buffer length. Various Linux distributions are in the process of releasing updated kernel packages to address this issue (Wiz).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management