[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025102004-CVE-2025-40013-cf06@gregkh>
Date: Mon, 20 Oct 2025 17:29:05 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-40013: ASoC: qcom: audioreach: fix potential null pointer dereference
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
ASoC: qcom: audioreach: fix potential null pointer dereference
It is possible that the topology parsing function
audioreach_widget_load_module_common() could return NULL or an error
pointer. Add missing NULL check so that we do not dereference it.
The Linux kernel CVE team has assigned CVE-2025-40013 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.16 with commit 36ad9bf1d93d66b901342eab9f8ed6c1537655a6 and fixed in 6.1.156 with commit 9c1ad4192f3d2fc85339718a6252cb3337848f7b
Issue introduced in 5.16 with commit 36ad9bf1d93d66b901342eab9f8ed6c1537655a6 and fixed in 6.6.110 with commit 70e1e5fe9f7e05ff831b56ebc02543e7811b8e18
Issue introduced in 5.16 with commit 36ad9bf1d93d66b901342eab9f8ed6c1537655a6 and fixed in 6.12.51 with commit 4dda55d04caac3b4102c26e29b1c27fa35636be3
Issue introduced in 5.16 with commit 36ad9bf1d93d66b901342eab9f8ed6c1537655a6 and fixed in 6.16.11 with commit 8f9c9fafc0e7a73bbff58954d171c016ddee1734
Issue introduced in 5.16 with commit 36ad9bf1d93d66b901342eab9f8ed6c1537655a6 and fixed in 6.17.1 with commit ef08ce6304d30b5778035d07b04514cb70839983
Issue introduced in 5.16 with commit 36ad9bf1d93d66b901342eab9f8ed6c1537655a6 and fixed in 6.18-rc1 with commit 8318e04ab2526b155773313b66a1542476ce1106
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-40013
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
sound/soc/qcom/qdsp6/topology.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/9c1ad4192f3d2fc85339718a6252cb3337848f7b
https://git.kernel.org/stable/c/70e1e5fe9f7e05ff831b56ebc02543e7811b8e18
https://git.kernel.org/stable/c/4dda55d04caac3b4102c26e29b1c27fa35636be3
https://git.kernel.org/stable/c/8f9c9fafc0e7a73bbff58954d171c016ddee1734
https://git.kernel.org/stable/c/ef08ce6304d30b5778035d07b04514cb70839983
https://git.kernel.org/stable/c/8318e04ab2526b155773313b66a1542476ce1106
Powered by blists - more mailing lists