Home

Description

In the Linux kernel, the following vulnerability has been resolved: i2c: cp2615: fix serial string NULL-deref at probe The cp2615 driver uses the USB device serial string as the i2c adapter name but does not make sure that the string exists. Verify that the device has a serial number before accessing it to avoid triggering a NULL-pointer dereference (e.g. with malicious devices).

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-24 | Assigner Linux

Product status

Default status
unaffected

4a7695429eade517b07ea72f9ec366130e81a076 (git) before e68c267787778bcdf3d91b06f794faaba7f0d1d1
affected

4a7695429eade517b07ea72f9ec366130e81a076 (git) before 4a22af879172336370ae3e81e7f65fb2f69472ee
affected

4a7695429eade517b07ea72f9ec366130e81a076 (git) before 69aece634a7eebafd9a596e5494d52facf6f26ec
affected

4a7695429eade517b07ea72f9ec366130e81a076 (git) before 13ccf9b106bba121728f1625c4375a1bd8f5c5a3
affected

4a7695429eade517b07ea72f9ec366130e81a076 (git) before a9778298f47036866ea15eeb17242e8a4612580f
affected

4a7695429eade517b07ea72f9ec366130e81a076 (git) before efe996bcfe50c2dcc6cf65c574285713b722ced7
affected

4a7695429eade517b07ea72f9ec366130e81a076 (git) before aa79f996eb41e95aed85a1bd7f56bcd6a3842008
affected

Default status
affected

5.13
affected

Any version before 5.13
unaffected

5.15.203 (semver)
unaffected

6.1.167 (semver)
unaffected

6.6.130 (semver)
unaffected

6.12.78 (semver)
unaffected

6.18.20 (semver)
unaffected

6.19.10 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/e68c267787778bcdf3d91b06f794faaba7f0d1d1

git.kernel.org/...c/4a22af879172336370ae3e81e7f65fb2f69472ee

git.kernel.org/...c/69aece634a7eebafd9a596e5494d52facf6f26ec

git.kernel.org/...c/13ccf9b106bba121728f1625c4375a1bd8f5c5a3

git.kernel.org/...c/a9778298f47036866ea15eeb17242e8a4612580f

git.kernel.org/...c/efe996bcfe50c2dcc6cf65c574285713b722ced7

git.kernel.org/...c/aa79f996eb41e95aed85a1bd7f56bcd6a3842008

cve.org (CVE-2026-31549)

nvd.nist.gov (CVE-2026-31549)

Download JSON