Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: usb: typec: class: Fix NULL pointer access Concurrent calls to typec_partner_unlink_device can lead to a NULL pointer dereference. This patch adds a mutex to protect USB device pointers and prevent this issue. The same mutex protects both the device pointers and the partner device registration.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.7, < 6.12.26 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/1fdde62411fe65640e69bc55ea027d5b7b2f0093Patch
- https://git.kernel.org/stable/c/de7c24febd21413ea8f49f61b36338b676c02852Patch
- https://git.kernel.org/stable/c/ec27386de23a511008c53aa2f3434ad180a3ca9aPatch
FAQ
What is CVE-2025-37809?
CVE-2025-37809 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: usb: typec: class: Fix NULL pointer access Concurrent calls to typec_partner_unlink_device can lead to a NULL pointer dereference....
How severe is CVE-2025-37809?
CVE-2025-37809 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-37809?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.