๐Ÿ” CVE Alert

CVE-2025-21689

MEDIUM 5.5

USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() This patch addresses a null-ptr-deref in qt2_process_read_urb() due to an incorrect bounds check in the following: if (newport > serial->num_ports) { dev_err(&port->dev, "%s - port change to invalid port: %i\n", __func__, newport); break; } The condition doesn't account for the valid range of the serial->port buffer, which is from 0 to serial->num_ports - 1. When newport is equal to serial->num_ports, the assignment of "port" in the following code is out-of-bounds and NULL: serial_priv->current_port = newport; port = serial->port[serial_priv->current_port]; The fix checks if newport is greater than or equal to serial->num_ports indicating it is out-of-bounds.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 10, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f7a33e608d9ae022b7f49307921627e34e9484ed < fa4c7472469d97c4707698b4c0e098f8cfc2bf22 f7a33e608d9ae022b7f49307921627e34e9484ed < 94770cf7c5124f0268d481886829dc2beecc4507 f7a33e608d9ae022b7f49307921627e34e9484ed < 6068dcff7f19e9fa6fa23ee03453ad6a40fa4efe f7a33e608d9ae022b7f49307921627e34e9484ed < 4b9b41fabcd38990f69ef0cee9c631d954a2b530 f7a33e608d9ae022b7f49307921627e34e9484ed < 6377838560c03b36e1153a42ef727533def9b68f f7a33e608d9ae022b7f49307921627e34e9484ed < f371471708c7d997f763b0e70565026eb67cc470 f7a33e608d9ae022b7f49307921627e34e9484ed < 8542b33622571f54dfc2a267fce378b6e3840b8b f7a33e608d9ae022b7f49307921627e34e9484ed < 575a5adf48b06a2980c9eeffedf699ed5534fade
Linux / Linux
3.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/fa4c7472469d97c4707698b4c0e098f8cfc2bf22 git.kernel.org: https://git.kernel.org/stable/c/94770cf7c5124f0268d481886829dc2beecc4507 git.kernel.org: https://git.kernel.org/stable/c/6068dcff7f19e9fa6fa23ee03453ad6a40fa4efe git.kernel.org: https://git.kernel.org/stable/c/4b9b41fabcd38990f69ef0cee9c631d954a2b530 git.kernel.org: https://git.kernel.org/stable/c/6377838560c03b36e1153a42ef727533def9b68f git.kernel.org: https://git.kernel.org/stable/c/f371471708c7d997f763b0e70565026eb67cc470 git.kernel.org: https://git.kernel.org/stable/c/8542b33622571f54dfc2a267fce378b6e3840b8b git.kernel.org: https://git.kernel.org/stable/c/575a5adf48b06a2980c9eeffedf699ed5534fade lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html