Upstream information
Description
In the Linux kernel, the following vulnerability has been resolved:platform/x86: intel: punit_ipc: fix memory corruption
This passes the address of the pointer "&punit_ipcdev" when the intent
was to pass the pointer itself "punit_ipcdev" (without the ampersand).
This means that the:
complete(&ipcdev->cmd_complete);
in intel_punit_ioc() will write to a wrong memory address corrupting it.
SUSE information
Overall state of this security issue: Does not affect SUSE products
SUSE Bugzilla entry: 1255122 [NEW] No SUSE Security Announcements cross referenced.SUSE Timeline for this CVE
CVE page created: Wed Dec 17 13:04:55 2025CVE page last modified: Wed Dec 17 14:44:53 2025