[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025052045-CVE-2025-37967-9dfe@gregkh>
Date: Tue, 20 May 2025 18:45:46 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-37967: usb: typec: ucsi: displayport: Fix deadlock
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: ucsi: displayport: Fix deadlock
This patch introduces the ucsi_con_mutex_lock / ucsi_con_mutex_unlock
functions to the UCSI driver. ucsi_con_mutex_lock ensures the connector
mutex is only locked if a connection is established and the partner pointer
is valid. This resolves a deadlock scenario where
ucsi_displayport_remove_partner holds con->mutex waiting for
dp_altmode_work to complete while dp_altmode_work attempts to acquire it.
The Linux kernel CVE team has assigned CVE-2025-37967 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.2 with commit af8622f6a585d8d82b11cd7987e082861fd0edd3 and fixed in 6.14.7 with commit 61fc1a8e1e10cc784cab5829930838aaf1d37af5
Issue introduced in 5.2 with commit af8622f6a585d8d82b11cd7987e082861fd0edd3 and fixed in 6.15-rc6 with commit 364618c89d4c57c85e5fc51a2446cd939bf57802
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-37967
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/usb/typec/ucsi/displayport.c
drivers/usb/typec/ucsi/ucsi.c
drivers/usb/typec/ucsi/ucsi.h
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/61fc1a8e1e10cc784cab5829930838aaf1d37af5
https://git.kernel.org/stable/c/364618c89d4c57c85e5fc51a2446cd939bf57802
Powered by blists - more mailing lists