Home

Description

In the Linux kernel, the following vulnerability has been resolved: platform/x86: intel: punit_ipc: fix memory corruption This passes the address of the pointer "&punit_ipcdev" when the intent was to pass the pointer itself "punit_ipcdev" (without the ampersand). This means that the: complete(&ipcdev->cmd_complete); in intel_punit_ioc() will write to a wrong memory address corrupting it.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-16 | Updated 2025-12-16 | Assigner Linux

Product status

Default status
unaffected

fdca4f16f57da76a8e68047923588a87d1c01f0a (git) before 15d560cdf5b36c51fffec07ac2a983ab3bff4cb2
affected

fdca4f16f57da76a8e68047923588a87d1c01f0a (git) before 46e9d6f54184573dae1dcbcf6685a572ba6f4480
affected

fdca4f16f57da76a8e68047923588a87d1c01f0a (git) before 3e7442c5802146fd418ba3f68dcb9ca92b5cec83
affected

fdca4f16f57da76a8e68047923588a87d1c01f0a (git) before a21615a4ac6fecbb586d59fe2206b63501021789
affected

fdca4f16f57da76a8e68047923588a87d1c01f0a (git) before c2ee6d38996775a19bfdf20cb01a9b8698cb0baa
affected

fdca4f16f57da76a8e68047923588a87d1c01f0a (git) before 9b9c0adbc3f8a524d291baccc9d0c04097fb4869
affected

Default status
affected

4.5
affected

Any version before 4.5
unaffected

5.15.197 (semver)
unaffected

6.1.159 (semver)
unaffected

6.6.119 (semver)
unaffected

6.12.61 (semver)
unaffected

6.17.11 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/15d560cdf5b36c51fffec07ac2a983ab3bff4cb2

git.kernel.org/...c/46e9d6f54184573dae1dcbcf6685a572ba6f4480

git.kernel.org/...c/3e7442c5802146fd418ba3f68dcb9ca92b5cec83

git.kernel.org/...c/a21615a4ac6fecbb586d59fe2206b63501021789

git.kernel.org/...c/c2ee6d38996775a19bfdf20cb01a9b8698cb0baa

git.kernel.org/...c/9b9c0adbc3f8a524d291baccc9d0c04097fb4869

cve.org (CVE-2025-68303)

nvd.nist.gov (CVE-2025-68303)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.