### [CVE-2025-37994](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37994) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=af8622f6a585d8d82b11cd7987e082861fd0edd3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:usb: typec: ucsi: displayport: Fix NULL pointer accessThis patch ensures that the UCSI driver waits for all pending tasks in theucsi_displayport_work workqueue to finish executing before proceeding withthe partner removal. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/w4zu/Debian_security