CVE-2025-21746

In the Linux kernel, the following vulnerability has been resolved: Input: synaptics - fix crash when enabling pass-through port When enabling a pass-through port an interrupt might come before psmouse driver binds to the pass-through port. However synaptics sub-driver tries to access psmouse instance presumably associated with the pass-through port to figure out if only 1 byte of response or entire protocol packet needs to be forwarded to the pass-through port and may crash if psmouse instance has not been attached to the port yet. Fix the crash by introducing open() and close() methods for the port and check if the port is open before trying to access psmouse instance. Because psmouse calls serio_open() only after attaching psmouse instance to serio port instance this prevents the potential crash.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

28 Oct 2025, 20:48

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-367
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Entrada: synaptics - arregla el fallo al habilitar el puerto de paso Al habilitar un puerto de paso, puede aparecer una interrupción antes de que el controlador psmouse se vincule al puerto de paso. Sin embargo, el subcontrolador synaptics intenta acceder a la instancia psmouse presuntamente asociada con el puerto de paso para averiguar si solo se necesita reenviar 1 byte de respuesta o el paquete de protocolo completo al puerto de paso y puede bloquearse si la instancia psmouse aún no se ha adjuntado al puerto. Arregla el bloqueo introduciendo los métodos open() y close() para el puerto y comprueba si el puerto está abierto antes de intentar acceder a la instancia psmouse. Debido a que psmouse llama a serio_open() solo después de adjuntar la instancia psmouse a la instancia del puerto serio, esto evita el posible bloqueo.
References () https://git.kernel.org/stable/c/08bd5b7c9a2401faabdaa1472d45c7de0755fd7e - () https://git.kernel.org/stable/c/08bd5b7c9a2401faabdaa1472d45c7de0755fd7e - Patch
References () https://git.kernel.org/stable/c/3e179d3f1ada963475395d81bfe91daef4d1a24c - () https://git.kernel.org/stable/c/3e179d3f1ada963475395d81bfe91daef4d1a24c - Patch
References () https://git.kernel.org/stable/c/87da1ea93ec9f9f0004e5b12e78789bc94e360bf - () https://git.kernel.org/stable/c/87da1ea93ec9f9f0004e5b12e78789bc94e360bf - Patch
References () https://git.kernel.org/stable/c/a2cbcd70133dc0d4d4c95ad4cd5412b935354c7c - () https://git.kernel.org/stable/c/a2cbcd70133dc0d4d4c95ad4cd5412b935354c7c - Patch

27 Feb 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3e179d3f1ada963475395d81bfe91daef4d1a24c -
  • () https://git.kernel.org/stable/c/a2cbcd70133dc0d4d4c95ad4cd5412b935354c7c -

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-10-28 20:48


NVD link : CVE-2025-21746

Mitre link : CVE-2025-21746

CVE.ORG link : CVE-2025-21746


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition