-
CVE-2025-38376
- EPSS 0.03%
- Published 25.07.2025 13:15:26
- Last modified 25.07.2025 15:29:19
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume Shawn and John reported a hang issue during system suspend as below: - USB gadget is enabled as Ethernet - There is data transfer over USB Ethernet (scp a big file between host and device) - Device is going in/out suspend (echo mem > /sys/power/state) The root cause is the USB device controller is suspended but the USB bus is still active which caused the USB host continues to transfer data with device and the device continues to queue USB requests (in this case, a delayed TCP ACK packet trigger the issue) after controller is suspended, however the USB controller clock is already gated off. Then if udc driver access registers after that point, the system will hang. The correct way to avoid such issue is to disconnect device from host when the USB bus is not at suspend state. Then the host will receive disconnect event and stop data transfer in time. To continue make USB gadget device work after system resume, this will reconnect device automatically. To make usb wakeup work if USB bus is already at suspend state, this will keep connection for it only when USB device controller has enabled wakeup capability.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
937f49be49d6ee696eb5457c21ff89c135c9b5ae
Version
235ffc17d0146d806f6ad8c094c24ff4878f2edb
Status
affected
Version <
c68a27bbebbdb4e0ccd45d4f0df7111a09ddac24
Version
235ffc17d0146d806f6ad8c094c24ff4878f2edb
Status
affected
Version <
5fd585fedb79bac2af9976b0fa3ffa354f0cc0bb
Version
235ffc17d0146d806f6ad8c094c24ff4878f2edb
Status
affected
Version <
31a6afbe86e8e9deba9ab53876ec49eafc7fd901
Version
235ffc17d0146d806f6ad8c094c24ff4878f2edb
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.2
Status
affected
Version <
6.2
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.97
Status
unaffected
Version <=
6.12.*
Version
6.12.37
Status
unaffected
Version <=
6.15.*
Version
6.15.6
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.06 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|