{"uuid": "c551df64-6bb8-41c7-8349-e862072b722f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21918", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10681", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21918\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Fix NULL pointer access\n\nResources should be released only after all threads that utilize them\nhave been destroyed.\nThis commit ensures that resources are not released prematurely by waiting\nfor the associated workqueue to complete before deallocating them.\n\ud83d\udccf Published: 2025-04-01T15:40:53.561Z\n\ud83d\udccf Modified: 2025-04-07T08:36:57.272Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/7a735a8a46f6ebf898bbefd96659ca5da798bce0\n2. https://git.kernel.org/stable/c/46fba7be161bb89068958138ea64ec33c0b446d4\n3. https://git.kernel.org/stable/c/079a3e52f3e751bb8f5937195bdf25c5d14fdff0\n4. https://git.kernel.org/stable/c/592a0327d026a122e97e8e8bb7c60cbbe7697344\n5. https://git.kernel.org/stable/c/b13abcb7ddd8d38de769486db5bd917537b32ab1", "creation_timestamp": "2025-04-07T08:44:49.000000Z"}