CVE-2025-38559
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
19/08/2025
Last modified:
28/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
platform/x86/intel/pmt: fix a crashlog NULL pointer access<br />
<br />
Usage of the intel_pmt_read() for binary sysfs, requires a pcidev. The<br />
current use of the endpoint value is only valid for telemetry endpoint<br />
usage.<br />
<br />
Without the ep, the crashlog usage causes the following NULL pointer<br />
exception:<br />
<br />
BUG: kernel NULL pointer dereference, address: 0000000000000000<br />
Oops: Oops: 0000 [#1] SMP NOPTI<br />
RIP: 0010:intel_pmt_read+0x3b/0x70 [pmt_class]<br />
Code:<br />
Call Trace:<br />
<br />
? sysfs_kf_bin_read+0xc0/0xe0<br />
kernfs_fop_read_iter+0xac/0x1a0<br />
vfs_read+0x26d/0x350<br />
ksys_read+0x6b/0xe0<br />
__x64_sys_read+0x1d/0x30<br />
x64_sys_call+0x1bc8/0x1d70<br />
do_syscall_64+0x6d/0x110<br />
<br />
Augment struct intel_pmt_entry with a pointer to the pcidev to avoid<br />
the NULL pointer exception.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



