In the Linux kernel, the following vulnerability has been resolved:
usb: typec: class: Invalidate USB device pointers on partner unregistration
To avoid using invalid USB device pointers after a Type-C partner disconnects, this patch clears the pointers upon partner unregistration. This ensures a clean state for future connections.
[
{
"id": "CVE-2025-37986-002d7e9b",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@40966fc9939e85677fdb489dfddfa205baaad03b",
"target": {
"file": "drivers/usb/typec/class.c",
"function": "typec_unregister_partner"
},
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 366.0,
"function_hash": "116295817690562584536345729612327413395"
}
},
{
"id": "CVE-2025-37986-36635b10",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@40966fc9939e85677fdb489dfddfa205baaad03b",
"target": {
"file": "drivers/usb/typec/class.c"
},
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"125159914309411023857835170940820370928",
"230819059375948064697974958633940553035",
"224159022708968995304002393867898901856",
"308567433242623273038772411910193738864",
"24395618761587867450549495162665969219",
"22860139897711274251021179778329883390",
"36474948017075962521573291645084203408"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-37986-3efb2402",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74911338f47c13d1b9470fc50718182bffad42e2",
"target": {
"file": "drivers/usb/typec/class.c"
},
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"125159914309411023857835170940820370928",
"230819059375948064697974958633940553035",
"224159022708968995304002393867898901856",
"308567433242623273038772411910193738864",
"24395618761587867450549495162665969219",
"22860139897711274251021179778329883390",
"36474948017075962521573291645084203408"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-37986-65114418",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@66e1a887273c6b89f09bc11a40d0a71d5a081a8e",
"target": {
"file": "drivers/usb/typec/class.c"
},
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"125159914309411023857835170940820370928",
"230819059375948064697974958633940553035",
"224159022708968995304002393867898901856",
"308567433242623273038772411910193738864",
"24395618761587867450549495162665969219",
"22860139897711274251021179778329883390",
"36474948017075962521573291645084203408"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-37986-cf349cf1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74911338f47c13d1b9470fc50718182bffad42e2",
"target": {
"file": "drivers/usb/typec/class.c",
"function": "typec_unregister_partner"
},
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 366.0,
"function_hash": "116295817690562584536345729612327413395"
}
},
{
"id": "CVE-2025-37986-fcbee09a",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@66e1a887273c6b89f09bc11a40d0a71d5a081a8e",
"target": {
"file": "drivers/usb/typec/class.c",
"function": "typec_unregister_partner"
},
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 366.0,
"function_hash": "116295817690562584536345729612327413395"
}
}
]