CVE-2025-68797
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| applicom | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's applicom ac_ioctl function. When the command (cmd) is 6, the function skips validation of the IndexCard and the check for a valid RamIO pointer. Despite this, it still attempts to read memory using readb(apbs[IndexCard].RamIO + VERS). If cmd is 6, IndexCard may point to a non-existent board where RamIO is NULL, causing a NULL pointer dereference. The fix involves skipping the readb access when cmd is 6 because this command is a global information query and does not require a specific board context.
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference in the Linux kernel, which may lead to a system crash or denial of service. An attacker could potentially exploit this to disrupt system operations or cause instability.