CVE-2025-68257
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's comedi subsystem, specifically in the compat ioctl handlers for i386 kernels. The issue is that these compat ioctl functions do not properly check whether a device is attached before performing operations. As a result, IOCTL calls can be made on devices that have not been properly configured, leading to missing crucial setup steps such as setting the dev->get_valid_routes() callback. This can cause a kernel crash due to a NULL pointer dereference when the system tries to call this uninitialized callback.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when certain IOCTL calls are made on unconfigured comedi devices. This can lead to system instability or denial of service, as the kernel encounters a NULL pointer dereference due to missing device setup callbacks.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability can be mitigated by ensuring that the Linux kernel is updated to a version where the fix is applied. The fix involves checking the device's attached status before performing any ioctls, preventing kernel crashes caused by unconfigured devices. Therefore, applying the latest kernel patches or updates that include this fix is the immediate step to mitigate the vulnerability.