CVE-2025-21918

In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Fix NULL pointer access Resources should be released only after all threads that utilize them have been destroyed. This commit ensures that resources are not released prematurely by waiting for the associated workqueue to complete before deallocating them.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*

History

11 Apr 2025, 13:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-476
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/079a3e52f3e751bb8f5937195bdf25c5d14fdff0 - () https://git.kernel.org/stable/c/079a3e52f3e751bb8f5937195bdf25c5d14fdff0 - Patch
References () https://git.kernel.org/stable/c/46fba7be161bb89068958138ea64ec33c0b446d4 - () https://git.kernel.org/stable/c/46fba7be161bb89068958138ea64ec33c0b446d4 - Patch
References () https://git.kernel.org/stable/c/592a0327d026a122e97e8e8bb7c60cbbe7697344 - () https://git.kernel.org/stable/c/592a0327d026a122e97e8e8bb7c60cbbe7697344 - Patch
References () https://git.kernel.org/stable/c/7a735a8a46f6ebf898bbefd96659ca5da798bce0 - () https://git.kernel.org/stable/c/7a735a8a46f6ebf898bbefd96659ca5da798bce0 - Patch
References () https://git.kernel.org/stable/c/b13abcb7ddd8d38de769486db5bd917537b32ab1 - () https://git.kernel.org/stable/c/b13abcb7ddd8d38de769486db5bd917537b32ab1 - Patch

07 Apr 2025, 09:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: ucsi: Se corrige el acceso a punteros nulos. Los recursos solo deben liberarse después de que se hayan destruido todos los subprocesos que los utilizan. Esta confirmación garantiza que los recursos no se liberen prematuramente esperando a que se complete la cola de trabajo asociada antes de desasignarlos.
References
  • () https://git.kernel.org/stable/c/7a735a8a46f6ebf898bbefd96659ca5da798bce0 -

01 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 16:15

Updated : 2025-04-11 13:16


NVD link : CVE-2025-21918

Mitre link : CVE-2025-21918

CVE.ORG link : CVE-2025-21918


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference