VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68303

CVE-2025-68303

Description

In the Linux kernel, the following vulnerability has been resolved:

platform/x86: intel: punit_ipc: fix memory corruption

This passes the address of the pointer "&punit_ipcdev" when the intent was to pass the pointer itself "punit_ipcdev" (without the ampersand). This means that the:

complete(&ipcdev->cmd_complete);

in intel_punit_ioc() will write to a wrong memory address corrupting it.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory corruption vulnerability in the Linux kernel's Intel P-Unit IPC driver due to passing the address of a pointer instead of the pointer itself, leading to writes to an incorrect memory location.

Root

Cause

The vulnerability resides in the intel_punit_ipc driver. In the code path that handles IPC command completion, the address of the pointer &punit_ipcdev is passed instead of the pointer punit_ipcdev itself. This causes the complete(&ipcdev->cmd_complete) call in intel_punit_ioc() to write to a wrong memory address, corrupting kernel memory [1][2][3].

Exploitation

An attacker with local access and the ability to interact with the Intel P-Unit IPC interface (e.g., through a device file or kernel API) could trigger this bug. The exact prerequisites are not detailed, but the corruption occurs during normal IPC completion handling, making it reachable from code paths that submit IPC commands.

Impact

Memory corruption can lead to system instability, denial of service (kernel panic), or potentially privilege escalation if the corrupted memory region contains security-critical data or function pointers.

Mitigation

The fix was applied in the mainline kernel and backported to stable branches. Users should update to a kernel version containing the commit that corrects the pointer dereference. The stable backports are referenced in [1], [2], and [3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.