#VU108799 NULL pointer dereference in Linux kernel - CVE-2025-37809
Published: May 8, 2025 / Updated: May 10, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the typec_register_partner(), typec_unregister_partner(), typec_get_partner(), typec_partner_attach(), typec_partner_deattach() and typec_register_port() functions in drivers/usb/typec/class.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/1fdde62411fe65640e69bc55ea027d5b7b2f0093
- https://git.kernel.org/stable/c/de7c24febd21413ea8f49f61b36338b676c02852
- https://git.kernel.org/stable/c/ec27386de23a511008c53aa2f3434ad180a3ca9a
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.26
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.14.5