In the Linux kernel, the following vulnerability has been resolved:
usb: typec: ucsi: Fix NULL pointer access
Resources should be released only after all threads that utilize them
have been destroyed.
This commit ensures that resources are not released prematurely by waiting
for the associated workqueue to complete before deallocating them.
References
Configurations
Configuration 1 (hide)
|
History
11 Apr 2025, 13:16
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
CWE | CWE-476 | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/079a3e52f3e751bb8f5937195bdf25c5d14fdff0 - Patch | |
References | () https://git.kernel.org/stable/c/46fba7be161bb89068958138ea64ec33c0b446d4 - Patch | |
References | () https://git.kernel.org/stable/c/592a0327d026a122e97e8e8bb7c60cbbe7697344 - Patch | |
References | () https://git.kernel.org/stable/c/7a735a8a46f6ebf898bbefd96659ca5da798bce0 - Patch | |
References | () https://git.kernel.org/stable/c/b13abcb7ddd8d38de769486db5bd917537b32ab1 - Patch |
07 Apr 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
01 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-01 16:15
Updated : 2025-04-11 13:16
NVD link : CVE-2025-21918
Mitre link : CVE-2025-21918
CVE.ORG link : CVE-2025-21918
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference