Description
In the Linux kernel, the following vulnerability has been resolved:

i2c: cp2615: fix serial string NULL-deref at probe

The cp2615 driver uses the USB device serial string as the i2c adapter
name but does not make sure that the string exists.

Verify that the device has a serial number before accessing it to avoid
triggering a NULL-pointer dereference (e.g. with malicious devices).
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: NULL dereference leading to possible kernel crash or denial of service
Action: Apply patch
AI Analysis

Impact

The cp2615 driver in the Linux kernel incorrectly assumes the USB device serial string exists and uses it as the I2C adapter name. If the string is missing, the driver dereferences a NULL pointer, which can crash the kernel or cause a system panic. The vulnerability is a classic NULL pointer dereference (CWE-476) and does not provide direct remote code execution but can disrupt services by halting the kernel.

Affected Systems

The issue exists in all Linux kernels that include the cp2615 driver—for example, kernels 5.13 and 7.0 releases (rc1 through rc7). All Linux kernel variants carrying this driver are potentially affected.

Risk and Exploitability

The CVSS score indicates a medium severity (5.5). The EPSS score is very low (<1%), showing that exploitation is uncommon. The vulnerability is not listed in CISA KEV. The likely attack vector is local USB device insertion: an attacker with physical or remote access that can plug in a USB device lacking a serial string may trigger the crash. The fix requires a NULL-check before accessing the string.

Generated by OpenCVE AI on April 28, 2026 at 14:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the cp2615 driver fix (commit id 13ccf9b).
  • If an immediate kernel upgrade is not feasible, disable the cp2615 driver or prevent it from loading until a patch is applied.
  • Strengthen physical security to restrict USB port access and ensure connected USB devices are verified before connection.

Generated by OpenCVE AI on April 28, 2026 at 14:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6238-1 linux security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Mon, 27 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Sat, 25 Apr 2026 00:15:00 +0000


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: i2c: cp2615: fix serial string NULL-deref at probe The cp2615 driver uses the USB device serial string as the i2c adapter name but does not make sure that the string exists. Verify that the device has a serial number before accessing it to avoid triggering a NULL-pointer dereference (e.g. with malicious devices).
Title i2c: cp2615: fix serial string NULL-deref at probe
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:10:55.565Z

Reserved: 2026-03-09T15:48:24.115Z

Link: CVE-2026-31549

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:29.060

Modified: 2026-04-27T20:15:45.027

Link: CVE-2026-31549

cve-icon Redhat

Severity :

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31549 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:30:33Z

Weaknesses