CVE-2025-21689

Updated: 2025-02-27 03:20:24.496624

Description:

In the Linux kernel, the following vulnerability has been resolved: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() This patch addresses a null-ptr-deref in qt2_process_read_urb() due to an incorrect bounds check in the following: if (newport > serial->num_ports) { dev_err(&port->dev, "%s - port change to invalid port: %i\n", __func__, newport); break; } The condition doesn't account for the valid range of the serial->port buffer, which is from 0 to serial->num_ports - 1. When newport is equal to serial->num_ports, the assignment of "port" in the following code is out-of-bounds and NULL: serial_priv->current_port = newport; port = serial->port[serial_priv->current_port]; The fix checks if newport is greater than or equal to serial->num_ports indicating it is out-of-bounds.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Ignored 2025-03-03 21:59:04
AlmaLinux 9.6 ESU kernel 5.14.0 5.5 MEDIUM Ignored 2025-07-05 02:18:12
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2025-03-03 21:59:04
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2025-03-03 21:59:04
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2025-03-03 21:59:04
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2025-03-03 21:59:04
CloudLinux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2025-03-03 21:59:04
Oracle Linux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2025-03-03 21:59:04
RHEL 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2025-05-24 02:23:01
Ubuntu 16.04 ELS linux 4.4.0 5.5 MEDIUM Ignored 2025-03-03 21:59:12
Total: 13