CVE-2025-21689

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21689
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21689.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-21689
Downstream
Related
Published
2025-02-10T16:15:38Z
Modified
2025-10-01T20:18:20Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

USB: serial: quatech2: fix null-ptr-deref in qt2processread_urb()

This patch addresses a null-ptr-deref in qt2processread_urb() due to an incorrect bounds check in the following:

   if (newport > serial->num_ports) {
           dev_err(&port->dev,
                   "%s - port change to invalid port: %i\n",
                   __func__, newport);
           break;
   }

The condition doesn't account for the valid range of the serial->port buffer, which is from 0 to serial->numports - 1. When newport is equal to serial->numports, the assignment of "port" in the following code is out-of-bounds and NULL:

   serial_priv->current_port = newport;
   port = serial->port[serial_priv->current_port];

The fix checks if newport is greater than or equal to serial->num_ports indicating it is out-of-bounds.

References

Affected packages