CVE-2025-68303
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: intel: punit_ipc: fix memory corruption
This passes the address of the pointer "&punit_ipcdev" when the intent
was to pass the pointer itself "punit_ipcdev" (without the ampersand).
This means that the:
complete(&ipcdev->cmd_complete);
in intel_punit_ioc() will write to a wrong memory address corrupting it.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | punit_ipc | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a coding error where the address of a pointer (&punit_ipcdev) was passed instead of the pointer itself (punit_ipcdev). This caused the function complete(&ipcdev->cmd_complete) in intel_punit_ioc() to write to an incorrect memory address, leading to memory corruption.
How can this vulnerability impact me? :
The vulnerability can cause memory corruption in the Linux kernel, which may lead to system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if exploited.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70