CVE-2025-21689
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-21689 is a vulnerability discovered in the Linux kernel's USB serial quatech2 driver, specifically in the qt2processread_urb() function. The vulnerability was identified on February 10, 2025, and affects Linux kernel versions from 3.5 through 6.13-rc7. The issue stems from an incorrect bounds check in the driver code that could lead to a null pointer dereference (NVD).

Technical details

The vulnerability is caused by an incorrect bounds check in the qt2processreadurb() function. The original code checks if 'newport > serial->numports' but fails to account for the valid range of the serial->port buffer, which is from 0 to serial->numports - 1. When newport equals serial->numports, the subsequent assignment of 'port' becomes out-of-bounds and NULL, leading to a null pointer dereference. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H and is classified as CWE-476 (NULL Pointer Dereference) (NVD).

Impact

The vulnerability can lead to a null pointer dereference in the Linux kernel's USB serial driver, potentially causing system crashes or denial of service conditions. The impact is limited to systems with the quatech2 USB serial driver loaded and requires local access to exploit (NVD).

Mitigation and workarounds

A fix has been developed and committed to the Linux kernel that modifies the bounds check to use '>=' instead of '>' when comparing newport with serial->num_ports. The patch has been backported to affected stable kernel versions. Users should update their Linux kernel to a patched version when available (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management