Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2421 articles · 130505 vulns · 35/41 feeds (7d)
← Back to list
—
CVE-2026-31549EXPLOITEDPATCHED
linux · linux_kernel

i2c: cp2615: fix serial string NULL-deref at probe

Description

In the Linux kernel, the following vulnerability has been resolved: i2c: cp2615: fix serial string NULL-deref at probe The cp2615 driver uses the USB device serial string as the i2c adapter name but does not make sure that the string exists. Verify that the device has a serial number before accessing it to avoid triggering a NULL-pointer dereference (e.g. with malicious devices).

Affected Products

VendorProductVersions
linuxlinux_kernel4a7695429eade517b07ea72f9ec366130e81a076, 4a7695429eade517b07ea72f9ec366130e81a076, 4a7695429eade517b07ea72f9ec366130e81a076, 4a7695429eade517b07ea72f9ec366130e81a076, 4a7695429eade517b07ea72f9ec366130e81a076, 4a7695429eade517b07ea72f9ec366130e81a076, 4a7695429eade517b07ea72f9ec366130e81a076, 5.13, 6.19.9

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
linuxlinuxmitre_affected90%

References

  • https://git.kernel.org/stable/c/e68c267787778bcdf3d91b06f794faaba7f0d1d1
  • https://git.kernel.org/stable/c/4a22af879172336370ae3e81e7f65fb2f69472ee
  • https://git.kernel.org/stable/c/69aece634a7eebafd9a596e5494d52facf6f26ec
  • https://git.kernel.org/stable/c/13ccf9b106bba121728f1625c4375a1bd8f5c5a3
  • https://git.kernel.org/stable/c/a9778298f47036866ea15eeb17242e8a4612580f
  • https://git.kernel.org/stable/c/efe996bcfe50c2dcc6cf65c574285713b722ced7
  • https://git.kernel.org/stable/c/aa79f996eb41e95aed85a1bd7f56bcd6a3842008

Related News (3 articles)

Tier A
Microsoft MSRC17h ago
CVE-2026-31549 i2c: cp2615: fix serial string NULL-deref at probe
→ No new info (linked only)
Tier C
VulDB5d ago
CVE-2026-31549 | Linux Kernel up to 6.19.9 i2c null pointer dereference
→ No new info (linked only)
Tier C
Linux Kernel CVEs5d ago
CVE-2026-31549: i2c: cp2615: fix serial string NULL-deref at probe
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
e68c267787778bcdf3d91b06f794faaba7f0d1d14a22af879172336370ae3e81e7f65fb2f69472ee69aece634a7eebafd9a596e5494d52facf6f26ec13ccf9b106bba121728f1625c4375a1bd8f5c5a3a9778298f47036866ea15eeb17242e8a4612580fefe996bcfe50c2dcc6cf65c574285713b722ced7aa79f996eb41e95aed85a1bd7f56bcd6a384200805.15.2036.1.1676.6.1306.12.786.18.206.19.107.0
PublishedApr 24, 2026
Last enriched5d agov3
Trending Score59
Source articles3
Independent3
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-31431EXP
crypto: algif_aead - Revert to operating out-of-place
Trending: 84
CRITICALCVE-2026-31661EXP
wifi: brcmsmac: Fix dma_free_coherent() size
Trending: 59
CRITICALCVE-2026-31689
EDAC/mc: Fix error path ordering in edac_mc_alloc()
Trending: 46
HIGHCVE-2026-23400EXP
rust_binder: call set_notification_done() without proc lock
Trending: 43
HIGHCVE-2026-31548
wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down
Trending: 40

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 24, 2026
Discovered by ZDM
Apr 24, 2026
Updated: affectedVersions
Apr 24, 2026
Actively Exploited
Apr 24, 2026
Patch Available
Apr 24, 2026
Updated: severity, affectedVersions, activelyExploited
Apr 24, 2026

Version History

v3
Last enriched 5d ago
v3Tier C5d ago

Updated severity to CRITICAL, added affected version 6.19.9, and noted that no exploit exists.

severityaffectedVersionsactivelyExploited
via VulDB
v2Tier C5d ago

Added CVE-2026-31549 and updated affected versions to include 5.13 and 7.0.

affectedVersions
via Linux Kernel CVEs
v15d ago

Initial creation