
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-21689 is a vulnerability discovered in the Linux kernel's USB serial quatech2 driver, specifically in the qt2processread_urb() function. The vulnerability was identified on February 10, 2025, and affects Linux kernel versions from 3.5 through 6.13-rc7. The issue stems from an incorrect bounds check in the driver code that could lead to a null pointer dereference (NVD).
The vulnerability is caused by an incorrect bounds check in the qt2processreadurb() function. The original code checks if 'newport > serial->numports' but fails to account for the valid range of the serial->port buffer, which is from 0 to serial->numports - 1. When newport equals serial->numports, the subsequent assignment of 'port' becomes out-of-bounds and NULL, leading to a null pointer dereference. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H and is classified as CWE-476 (NULL Pointer Dereference) (NVD).
The vulnerability can lead to a null pointer dereference in the Linux kernel's USB serial driver, potentially causing system crashes or denial of service conditions. The impact is limited to systems with the quatech2 USB serial driver loaded and requires local access to exploit (NVD).
A fix has been developed and committed to the Linux kernel that modifies the bounds check to use '>=' instead of '>' when comparing newport with serial->num_ports. The patch has been backported to affected stable kernel versions. Users should update their Linux kernel to a patched version when available (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."