CVE-2025-68303
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/12/2025
Última modificación:
18/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
platform/x86: intel: punit_ipc: fix memory corruption<br />
<br />
This passes the address of the pointer "&punit_ipcdev" when the intent<br />
was to pass the pointer itself "punit_ipcdev" (without the ampersand).<br />
This means that the:<br />
<br />
complete(&ipcdev->cmd_complete);<br />
<br />
in intel_punit_ioc() will write to a wrong memory address corrupting it.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/15d560cdf5b36c51fffec07ac2a983ab3bff4cb2
- https://git.kernel.org/stable/c/3e7442c5802146fd418ba3f68dcb9ca92b5cec83
- https://git.kernel.org/stable/c/46e9d6f54184573dae1dcbcf6685a572ba6f4480
- https://git.kernel.org/stable/c/9b9c0adbc3f8a524d291baccc9d0c04097fb4869
- https://git.kernel.org/stable/c/a21615a4ac6fecbb586d59fe2206b63501021789
- https://git.kernel.org/stable/c/c2ee6d38996775a19bfdf20cb01a9b8698cb0baa



