CVE-2025-68335

Source
https://cve.org/CVERecord?id=CVE-2025-68335
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68335.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68335
Downstream
Related
Published
2025-12-22T16:14:12.614Z
Modified
2026-03-20T12:46:22.524838Z
Summary
comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel()
Details

In the Linux kernel, the following vulnerability has been resolved:

comedi: pcl818: fix null-ptr-deref in pcl818aicancel()

Syzbot identified an issue [1] in pcl818aicancel(), which stems from the fact that in case of early device detach via pcl818detach(), subdevice dev->readsubdev may not have initialized its pointer to &struct comedi_async as intended. Thus, any such dereferencing of &s->async->cmd will lead to general protection fault and kernel crash.

Mitigate this problem by removing a call to pcl818aicancel() from pcl818detach() altogether. This way, if the subdevice setups its support for async commands, everything async-related will be handled via subdevice's own ->cancel() function in comedidevicedetachlocked() even before pcl818_detach(). If no support for asynchronous commands is provided, there is no need to cancel anything either.

[1] Syzbot crash: Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f] CPU: 1 UID: 0 PID: 6050 Comm: syz.0.18 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 RIP: 0010:pcl818aicancel+0x69/0x3f0 drivers/comedi/drivers/pcl818.c:762 ... Call Trace: <TASK> pcl818detach+0x66/0xd0 drivers/comedi/drivers/pcl818.c:1115 comedidevicedetachlocked+0x178/0x750 drivers/comedi/drivers.c:207 dodevconfigioctl drivers/comedi/comedifops.c:848 [inline] comediunlockedioctl+0xcde/0x1020 drivers/comedi/comedifops.c:2178 vfs_ioctl fs/ioctl.c:51 [inline] __dosysioctl fs/ioctl.c:597 [inline] ...

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68335.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
00aba6e7b5653a6607238ecdab7172318059d984
Fixed
b2a5b172dc05be6c4f2c5542c1bbc6b14d60ff16
Fixed
935ad4b3c325c24fff2c702da403283025ffc722
Fixed
88d99ca5adbd01ff088f5fb2ddeba5755e085e52
Fixed
5caa40e7c6a43e08e3574f990865127705c22861
Fixed
d948c53dec36dafe182631457597c49c1f1df5ea
Fixed
877adccfacb32687b90714a27cfb09f444fdfa16
Fixed
a51f025b5038abd3d22eed2ede4cd46793d89565

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68335.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.15.0
Fixed
5.15.198
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.160
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.120
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.62
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.12
Type
ECOSYSTEM
Events
Introduced
6.18.0
Fixed
6.18.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68335.json"