SB2025050829 - NULL pointer dereference in Linux kernel usb typec driver
Published: May 8, 2025 Updated: May 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2025-37809)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the typec_register_partner(), typec_unregister_partner(), typec_get_partner(), typec_partner_attach(), typec_partner_deattach() and typec_register_port() functions in drivers/usb/typec/class.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/1fdde62411fe65640e69bc55ea027d5b7b2f0093
- https://git.kernel.org/stable/c/de7c24febd21413ea8f49f61b36338b676c02852
- https://git.kernel.org/stable/c/ec27386de23a511008c53aa2f3434ad180a3ca9a
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.26
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.14.5