CVE-2025-21689

Source
https://cve.org/CVERecord?id=CVE-2025-21689
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21689.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21689
Downstream
Related
Published
2025-02-10T15:58:45.493Z
Modified
2026-05-07T04:16:58.222113Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
Details

In the Linux kernel, the following vulnerability has been resolved:

USB: serial: quatech2: fix null-ptr-deref in qt2processread_urb()

This patch addresses a null-ptr-deref in qt2processread_urb() due to an incorrect bounds check in the following:

   if (newport > serial->num_ports) {
           dev_err(&port->dev,
                   "%s - port change to invalid port: %i\n",
                   __func__, newport);
           break;
   }

The condition doesn't account for the valid range of the serial->port buffer, which is from 0 to serial->numports - 1. When newport is equal to serial->numports, the assignment of "port" in the following code is out-of-bounds and NULL:

   serial_priv->current_port = newport;
   port = serial->port[serial_priv->current_port];

The fix checks if newport is greater than or equal to serial->num_ports indicating it is out-of-bounds.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21689.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f7a33e608d9ae022b7f49307921627e34e9484ed
Fixed
fa4c7472469d97c4707698b4c0e098f8cfc2bf22
Fixed
94770cf7c5124f0268d481886829dc2beecc4507
Fixed
6068dcff7f19e9fa6fa23ee03453ad6a40fa4efe
Fixed
4b9b41fabcd38990f69ef0cee9c631d954a2b530
Fixed
6377838560c03b36e1153a42ef727533def9b68f
Fixed
f371471708c7d997f763b0e70565026eb67cc470
Fixed
8542b33622571f54dfc2a267fce378b6e3840b8b
Fixed
575a5adf48b06a2980c9eeffedf699ed5534fade

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21689.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.5.0
Fixed
5.4.290
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.234
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.178
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.128
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.75
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.12
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21689.json"