CVE-2025-68303
platform/x86: intel: punit_ipc: fix memory corruption
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: platform/x86: intel: punit_ipc: fix memory corruption This passes the address of the pointer "&punit_ipcdev" when the intent was to pass the pointer itself "punit_ipcdev" (without the ampersand). This means that the: complete(&ipcdev->cmd_complete); in intel_punit_ioc() will write to a wrong memory address corrupting it.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 16, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
fdca4f16f57da76a8e68047923588a87d1c01f0a < 15d560cdf5b36c51fffec07ac2a983ab3bff4cb2 fdca4f16f57da76a8e68047923588a87d1c01f0a < 46e9d6f54184573dae1dcbcf6685a572ba6f4480 fdca4f16f57da76a8e68047923588a87d1c01f0a < 3e7442c5802146fd418ba3f68dcb9ca92b5cec83 fdca4f16f57da76a8e68047923588a87d1c01f0a < a21615a4ac6fecbb586d59fe2206b63501021789 fdca4f16f57da76a8e68047923588a87d1c01f0a < c2ee6d38996775a19bfdf20cb01a9b8698cb0baa fdca4f16f57da76a8e68047923588a87d1c01f0a < 9b9c0adbc3f8a524d291baccc9d0c04097fb4869
Linux / Linux
4.5
References
git.kernel.org: https://git.kernel.org/stable/c/15d560cdf5b36c51fffec07ac2a983ab3bff4cb2 git.kernel.org: https://git.kernel.org/stable/c/46e9d6f54184573dae1dcbcf6685a572ba6f4480 git.kernel.org: https://git.kernel.org/stable/c/3e7442c5802146fd418ba3f68dcb9ca92b5cec83 git.kernel.org: https://git.kernel.org/stable/c/a21615a4ac6fecbb586d59fe2206b63501021789 git.kernel.org: https://git.kernel.org/stable/c/c2ee6d38996775a19bfdf20cb01a9b8698cb0baa git.kernel.org: https://git.kernel.org/stable/c/9b9c0adbc3f8a524d291baccc9d0c04097fb4869