VYPR
Unrated severityNVD Advisory· Published Jan 13, 2026· Updated Apr 15, 2026

CVE-2025-68797

CVE-2025-68797

Description

In the Linux kernel, the following vulnerability has been resolved:

char: applicom: fix NULL pointer dereference in ac_ioctl

Discovered by Atuin - Automated Vulnerability Discovery Engine.

In ac_ioctl, the validation of IndexCard and the check for a valid RamIO pointer are skipped when cmd is 6. However, the function unconditionally executes readb(apbs[IndexCard].RamIO + VERS) at the end.

If cmd is 6, IndexCard may reference a board that does not exist (where RamIO is NULL), leading to a NULL pointer dereference.

Fix this by skipping the readb access when cmd is 6, as this command is a global information query and does not target a specific board context.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel applicom driver NULL pointer dereference via IOCTL allows unprivileged local denial-of-service.

Vulnerability

In the Linux kernel, a NULL pointer dereference vulnerability exists in the applicom character driver's ac_ioctl function. The root cause is a missing validation check: when the IOCTL command is 6 (a global information query), the code bypasses the normal validation of IndexCard and the corresponding RamIO pointer. Despite this, the function unconditionally executes readb(apbs[IndexCard].RamIO + VERS) at the end, which dereferences a potentially NULL RamIO pointer if the referenced board does not exist [1].

Exploitation

An unprivileged local user with access to the /dev/com_x device file (or equivalent) can trigger this vulnerability by issuing an IOCTL with command code 6 and an IndexCard value that references a non-existent board. The attacker does not require special privileges beyond the ability to open and use the applicable character device [1].

Impact

Successful exploitation leads to a NULL pointer dereference, which crashes the kernel and causes a denial of service (DoS) on the affected system. The attacker cannot execute arbitrary code or elevate privileges, but can reliably crash the machine [1].

Mitigation

This vulnerability was fixed in the Linux kernel by skipping the readb access when the IOCTL command is 6. Patched versions are available via the stable kernel trees. System administrators should apply the latest kernel updates from their Linux distribution [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.