Description

In the Linux kernel, the following vulnerability has been resolved: platform/x86: intel: punit_ipc: fix memory corruption This passes the address of the pointer "&punit_ipcdev" when the intent was to pass the pointer itself "punit_ipcdev" (without the ampersand). This means that the: complete(&ipcdev->cmd_complete); in intel_punit_ioc() will write to a wrong memory address corrupting it.

INFO

Published Date :

2025-12-16T15:06:21.208Z

Last Modified :

2025-12-16T15:06:21.208Z

Source :

Linux
AFFECTED PRODUCTS

The following products are affected by CVE-2025-68303 vulnerability.

Vendors Products
Linux
  • Linux Kernel

CVSS Vulnerability Scoring System