[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025090455-CVE-2025-38706-da55@gregkh>
Date: Thu, 4 Sep 2025 17:33:11 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-38706: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()
snd_soc_remove_pcm_runtime() might be called with rtd == NULL which will
leads to null pointer dereference.
This was reproduced with topology loading and marking a link as ignore
due to missing hardware component on the system.
On module removal the soc_tplg_remove_link() would call
snd_soc_remove_pcm_runtime() with rtd == NULL since the link was ignored,
no runtime was created.
The Linux kernel CVE team has assigned CVE-2025-38706 to this issue.
Affected and fixed versions
===========================
Fixed in 5.10.241 with commit 8b465bedc2b417fd27c1d1ab7122882b4b60b1a0
Fixed in 5.15.190 with commit 82ba7b8cf9f6e3bf392a9f08ba3d1c0b200ccb94
Fixed in 6.1.149 with commit 7f8fc03712194fd4e2df28af7f7f7a38205934ef
Fixed in 6.6.103 with commit 41f53afe53a57a7c50323f99424b598190acf192
Fixed in 6.12.43 with commit 2fce20decc6a83f16dd73744150c4e7ea6c97c21
Fixed in 6.15.11 with commit cecc65827ef3df9754e097582d89569139e6cd1e
Fixed in 6.16.2 with commit 7ce0a7255ce97ed7c54afae83fdbce712a1f0c9e
Fixed in 6.17-rc1 with commit 2d91cb261cac6d885954b8f5da28b5c176c18131
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-38706
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
sound/soc/soc-core.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/8b465bedc2b417fd27c1d1ab7122882b4b60b1a0
https://git.kernel.org/stable/c/82ba7b8cf9f6e3bf392a9f08ba3d1c0b200ccb94
https://git.kernel.org/stable/c/7f8fc03712194fd4e2df28af7f7f7a38205934ef
https://git.kernel.org/stable/c/41f53afe53a57a7c50323f99424b598190acf192
https://git.kernel.org/stable/c/2fce20decc6a83f16dd73744150c4e7ea6c97c21
https://git.kernel.org/stable/c/cecc65827ef3df9754e097582d89569139e6cd1e
https://git.kernel.org/stable/c/7ce0a7255ce97ed7c54afae83fdbce712a1f0c9e
https://git.kernel.org/stable/c/2d91cb261cac6d885954b8f5da28b5c176c18131
Powered by blists - more mailing lists