In the Linux kernel, the following vulnerability has been resolved:
platform/x86/intel/pmt: fix a crashlog NULL pointer access
Usage of the intel_pmt_read() for binary sysfs, requires a pcidev. The
current use of the endpoint value is only valid for telemetry endpoint
usage.
Without the ep, the crashlog usage causes the following NULL pointer
exception:
BUG: kernel NULL pointer dereference, address: 0000000000000000
Oops: Oops: 0000 [#1] SMP NOPTI
RIP: 0010:intel_pmt_read+0x3b/0x70 [pmt_class]
Code:
Call Trace:
<TASK>
? sysfs_kf_bin_read+0xc0/0xe0
kernfs_fop_read_iter+0xac/0x1a0
vfs_read+0x26d/0x350
ksys_read+0x6b/0xe0
__x64_sys_read+0x1d/0x30
x64_sys_call+0x1bc8/0x1d70
do_syscall_64+0x6d/0x110
Augment struct intel_pmt_entry with a pointer to the pcidev to avoid
the NULL pointer exception.
References
Configurations
Configuration 1 (hide)
|
History
28 Nov 2025, 14:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux linux Kernel
Linux |
|
| CWE | CWE-476 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/089d05266b2caf020ac2ae2cd2be78f580268f5d - Patch | |
| References | () https://git.kernel.org/stable/c/18d53b543b5447478e259c96ca4688393f327c98 - Patch | |
| References | () https://git.kernel.org/stable/c/54d5cd4719c5e87f33d271c9ac2e393147d934f8 - Patch | |
| References | () https://git.kernel.org/stable/c/860d93bd6a21f08883711196344c353bc3936a2b - Patch |
Information
Published : 2025-08-19 17:15
Updated : 2025-11-28 14:42
NVD link : CVE-2025-38559
Mitre link : CVE-2025-38559
CVE.ORG link : CVE-2025-38559
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
