Home

Description

In the Linux kernel, the following vulnerability has been resolved: platform/x86/intel/pmt: fix a crashlog NULL pointer access Usage of the intel_pmt_read() for binary sysfs, requires a pcidev. The current use of the endpoint value is only valid for telemetry endpoint usage. Without the ep, the crashlog usage causes the following NULL pointer exception: BUG: kernel NULL pointer dereference, address: 0000000000000000 Oops: Oops: 0000 [#1] SMP NOPTI RIP: 0010:intel_pmt_read+0x3b/0x70 [pmt_class] Code: Call Trace: <TASK> ? sysfs_kf_bin_read+0xc0/0xe0 kernfs_fop_read_iter+0xac/0x1a0 vfs_read+0x26d/0x350 ksys_read+0x6b/0xe0 __x64_sys_read+0x1d/0x30 x64_sys_call+0x1bc8/0x1d70 do_syscall_64+0x6d/0x110 Augment struct intel_pmt_entry with a pointer to the pcidev to avoid the NULL pointer exception.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-19 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

045a513040cc0242d364c05c3791594e2294f32d before 860d93bd6a21f08883711196344c353bc3936a2b
affected

045a513040cc0242d364c05c3791594e2294f32d before 18d53b543b5447478e259c96ca4688393f327c98
affected

045a513040cc0242d364c05c3791594e2294f32d before 089d05266b2caf020ac2ae2cd2be78f580268f5d
affected

045a513040cc0242d364c05c3791594e2294f32d before 54d5cd4719c5e87f33d271c9ac2e393147d934f8
affected

Default status
affected

6.12
affected

Any version before 6.12
unaffected

6.12.42
unaffected

6.15.10
unaffected

6.16.1
unaffected

6.17
unaffected

References

git.kernel.org/...c/860d93bd6a21f08883711196344c353bc3936a2b

git.kernel.org/...c/18d53b543b5447478e259c96ca4688393f327c98

git.kernel.org/...c/089d05266b2caf020ac2ae2cd2be78f580268f5d

git.kernel.org/...c/54d5cd4719c5e87f33d271c9ac2e393147d934f8

cve.org (CVE-2025-38559)

nvd.nist.gov (CVE-2025-38559)

Download JSON