CVE-2025-68797
Description
In the Linux kernel, the following vulnerability has been resolved:
char: applicom: fix NULL pointer dereference in ac_ioctl
Discovered by Atuin - Automated Vulnerability Discovery Engine.
In ac_ioctl, the validation of IndexCard and the check for a valid RamIO pointer are skipped when cmd is 6. However, the function unconditionally executes readb(apbs[IndexCard].RamIO + VERS) at the end.
If cmd is 6, IndexCard may reference a board that does not exist (where RamIO is NULL), leading to a NULL pointer dereference.
Fix this by skipping the readb access when cmd is 6, as this command is a global information query and does not target a specific board context.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel applicom driver NULL pointer dereference via IOCTL allows unprivileged local denial-of-service.
Vulnerability
In the Linux kernel, a NULL pointer dereference vulnerability exists in the applicom character driver's ac_ioctl function. The root cause is a missing validation check: when the IOCTL command is 6 (a global information query), the code bypasses the normal validation of IndexCard and the corresponding RamIO pointer. Despite this, the function unconditionally executes readb(apbs[IndexCard].RamIO + VERS) at the end, which dereferences a potentially NULL RamIO pointer if the referenced board does not exist [1].
Exploitation
An unprivileged local user with access to the /dev/com_x device file (or equivalent) can trigger this vulnerability by issuing an IOCTL with command code 6 and an IndexCard value that references a non-existent board. The attacker does not require special privileges beyond the ability to open and use the applicable character device [1].
Impact
Successful exploitation leads to a NULL pointer dereference, which crashes the kernel and causes a denial of service (DoS) on the affected system. The attacker cannot execute arbitrary code or elevate privileges, but can reliably crash the machine [1].
Mitigation
This vulnerability was fixed in the Linux kernel by skipping the readb access when the IOCTL command is 6. Patched versions are available via the stable kernel trees. System administrators should apply the latest kernel updates from their Linux distribution [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/0b8b353e09888bccee405e0dd6feafb60360f478nvd
- git.kernel.org/stable/c/5a6240804fb7bbd4f5f6e706955248a6f4c1abbcnvd
- git.kernel.org/stable/c/74883565c621eec6cd2e35fe6d27454cf2810c23nvd
- git.kernel.org/stable/c/82d12088c297fa1cef670e1718b3d24f414c23f7nvd
- git.kernel.org/stable/c/d1b0452280029d05a98c75631131ee61c0b0d084nvd
- git.kernel.org/stable/c/d285517429a75423789e6408653e57b6fdfc8e54nvd
- git.kernel.org/stable/c/f83e3e9f89181b42f6076a115d767a7552c4a39envd
News mentions
0No linked articles in our index yet.