U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-37812 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: usb: cdns3: Fix deadlock when using NCM gadget The cdns3 driver has the same NCM deadlock as fixed in cdnsp by commit 58f2fcb3a845 ("usb: cdnsp: Fix deadlock issue during using NCM gadget"). Under PREEMPT_RT the deadlock can be readily triggered by heavy network traffic, for example using "iperf --bidir" over NCM ethernet link. The deadlock occurs because the threaded interrupt handler gets preempted by a softirq, but both are protected by the same spinlock. Prevent deadlock by disabling softirq during threaded irq handler.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/09e90a9689a4aac7a2f726dc2aa472b0b37937b7 kernel.org
https://git.kernel.org/stable/c/48a62deb857f0694f611949015e70ad194d97159 kernel.org
https://git.kernel.org/stable/c/59a760e4796a3cd88d8b9d7706e0a638de677751 kernel.org
https://git.kernel.org/stable/c/74cd6e408a4c010e404832f0e4609d29bf1d0c41 kernel.org
https://git.kernel.org/stable/c/a1059896f2bfdcebcdc7153c3be2307ea319501f kernel.org
https://git.kernel.org/stable/c/b96239582531775f2fdcb14de29bdb6870fd4c8c kernel.org
https://git.kernel.org/stable/c/c27db84ed44e50ff90d9e3a2a25fae2e0a0fa015 kernel.org
https://git.kernel.org/stable/c/eebfb64c624fc738b669100173344fb441c5e719 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-37812
NVD Published Date:
05/08/2025
NVD Last Modified:
05/08/2025
Source:
kernel.org