{"id":"CVE-2025-68303","summary":"platform/x86: intel: punit_ipc: fix memory corruption","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: intel: punit_ipc: fix memory corruption\n\nThis passes the address of the pointer \"&punit_ipcdev\" when the intent\nwas to pass the pointer itself \"punit_ipcdev\" (without the ampersand).\nThis means that the:\n\n\tcomplete(&ipcdev-\u003ecmd_complete);\n\nin intel_punit_ioc() will write to a wrong memory address corrupting it.","modified":"2026-04-16T04:35:42.353616725Z","published":"2025-12-16T15:06:21.208Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0473-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68303.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/15d560cdf5b36c51fffec07ac2a983ab3bff4cb2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3e7442c5802146fd418ba3f68dcb9ca92b5cec83"},{"type":"WEB","url":"https://git.kernel.org/stable/c/46e9d6f54184573dae1dcbcf6685a572ba6f4480"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9b9c0adbc3f8a524d291baccc9d0c04097fb4869"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a21615a4ac6fecbb586d59fe2206b63501021789"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c2ee6d38996775a19bfdf20cb01a9b8698cb0baa"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68303.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68303"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"fdca4f16f57da76a8e68047923588a87d1c01f0a"},{"fixed":"15d560cdf5b36c51fffec07ac2a983ab3bff4cb2"},{"fixed":"46e9d6f54184573dae1dcbcf6685a572ba6f4480"},{"fixed":"3e7442c5802146fd418ba3f68dcb9ca92b5cec83"},{"fixed":"a21615a4ac6fecbb586d59fe2206b63501021789"},{"fixed":"c2ee6d38996775a19bfdf20cb01a9b8698cb0baa"},{"fixed":"9b9c0adbc3f8a524d291baccc9d0c04097fb4869"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68303.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.5.0"},{"fixed":"5.15.197"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.159"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.119"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.61"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68303.json"}}],"schema_version":"1.7.5"}