
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Linux kernel affecting the Renesas USBHS driver, identified as CVE-2025-38136. The issue was disclosed on July 3, 2025, and involves improper clock handling and power management initialization in the USB host controller driver. The vulnerability specifically affects systems using the Renesas USBHS controller, particularly on the RZ/V2H SoC platform (NVD, CVE).
The vulnerability stems from an incorrect initialization sequence in the usbhs_probe() function where registers are accessed before enabling the required clocks. The problematic call flow involves: usbhs_probe() -> usbhs_sys_clock_ctrl() -> usbhs_bset() -> usbhs_write() -> iowrite16(). Since iowrite16() is performed without ensuring the required clocks are enabled, this leads to synchronous external abort errors on affected systems (NVD).
When triggered, the vulnerability causes system crashes due to synchronous external abort errors. This occurs because of uninitialized clock access, which can lead to system instability and potential denial of service on affected devices running the Renesas USBHS driver (Rapid7).
The fix involves reordering the initialization sequence in usbhs_probe() to enable runtime PM before accessing registers. This ensures that clocks are properly initialized and acquired before any register access occurs, preventing the synchronous external abort errors (CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."