{"id":"CVE-2025-21918","summary":"usb: typec: ucsi: Fix NULL pointer access","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Fix NULL pointer access\n\nResources should be released only after all threads that utilize them\nhave been destroyed.\nThis commit ensures that resources are not released prematurely by waiting\nfor the associated workqueue to complete before deallocating them.","modified":"2026-04-02T12:45:17.003749Z","published":"2025-04-01T15:40:53.561Z","related":["SUSE-SU-2025:01614-1","SUSE-SU-2025:01707-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01964-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20206-1","SUSE-SU-2025:20270-1","SUSE-SU-2025:20283-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21918.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/079a3e52f3e751bb8f5937195bdf25c5d14fdff0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/46fba7be161bb89068958138ea64ec33c0b446d4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/592a0327d026a122e97e8e8bb7c60cbbe7697344"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7a735a8a46f6ebf898bbefd96659ca5da798bce0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b13abcb7ddd8d38de769486db5bd917537b32ab1"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21918.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21918"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b9aa02ca39a49740926c2c450a1505a4a0f8954a"},{"fixed":"7a735a8a46f6ebf898bbefd96659ca5da798bce0"},{"fixed":"46fba7be161bb89068958138ea64ec33c0b446d4"},{"fixed":"079a3e52f3e751bb8f5937195bdf25c5d14fdff0"},{"fixed":"592a0327d026a122e97e8e8bb7c60cbbe7697344"},{"fixed":"b13abcb7ddd8d38de769486db5bd917537b32ab1"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21918.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}