๐Ÿ” CVE Alert

CVE-2025-68797

UNKNOWN 0.0

char: applicom: fix NULL pointer dereference in ac_ioctl

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: char: applicom: fix NULL pointer dereference in ac_ioctl Discovered by Atuin - Automated Vulnerability Discovery Engine. In ac_ioctl, the validation of IndexCard and the check for a valid RamIO pointer are skipped when cmd is 6. However, the function unconditionally executes readb(apbs[IndexCard].RamIO + VERS) at the end. If cmd is 6, IndexCard may reference a board that does not exist (where RamIO is NULL), leading to a NULL pointer dereference. Fix this by skipping the readb access when cmd is 6, as this command is a global information query and does not target a specific board context.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 13, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 5a6240804fb7bbd4f5f6e706955248a6f4c1abbc 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < d1b0452280029d05a98c75631131ee61c0b0d084 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 0b8b353e09888bccee405e0dd6feafb60360f478 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < d285517429a75423789e6408653e57b6fdfc8e54 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 74883565c621eec6cd2e35fe6d27454cf2810c23 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f83e3e9f89181b42f6076a115d767a7552c4a39e 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 82d12088c297fa1cef670e1718b3d24f414c23f7
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5a6240804fb7bbd4f5f6e706955248a6f4c1abbc git.kernel.org: https://git.kernel.org/stable/c/d1b0452280029d05a98c75631131ee61c0b0d084 git.kernel.org: https://git.kernel.org/stable/c/0b8b353e09888bccee405e0dd6feafb60360f478 git.kernel.org: https://git.kernel.org/stable/c/d285517429a75423789e6408653e57b6fdfc8e54 git.kernel.org: https://git.kernel.org/stable/c/74883565c621eec6cd2e35fe6d27454cf2810c23 git.kernel.org: https://git.kernel.org/stable/c/f83e3e9f89181b42f6076a115d767a7552c4a39e git.kernel.org: https://git.kernel.org/stable/c/82d12088c297fa1cef670e1718b3d24f414c23f7