Home

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed If earlier opening of source graph fails (e.g. ADSP rejects due to incorrect audioreach topology), the graph is closed and "dai_data->graph[dai->id]" is assigned NULL. Preparing the DAI for sink graph continues though and next call to q6apm_lpass_dai_prepare() receives dai_data->graph[dai->id]=NULL leading to NULL pointer exception: qcom-apm gprsvc:service:2:1: Error (1) Processing 0x01001002 cmd qcom-apm gprsvc:service:2:1: DSP returned error[1001002] 1 q6apm-lpass-dais 30000000.remoteproc:glink-edge:gpr:service@1:bedais: fail to start APM port 78 q6apm-lpass-dais 30000000.remoteproc:glink-edge:gpr:service@1:bedais: ASoC: error at snd_soc_pcm_dai_prepare on TX_CODEC_DMA_TX_3: -22 Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a8 ... Call trace: q6apm_graph_media_format_pcm+0x48/0x120 (P) q6apm_lpass_dai_prepare+0x110/0x1b4 snd_soc_pcm_dai_prepare+0x74/0x108 __soc_pcm_prepare+0x44/0x160 dpcm_be_dai_prepare+0x124/0x1c0

PUBLISHED Reserved 2025-04-16 | Published 2025-10-04 | Updated 2025-10-04 | Assigner Linux

Product status

Default status
unaffected

30ad723b93ade607a678698e5947a55a4375c3a1 before 01d1ba106c9e02a2e7d41e07be49031a0ff0ecaa
affected

30ad723b93ade607a678698e5947a55a4375c3a1 before 411f7d4f7038200cdf6d4f71ee31026ebf2dfedb
affected

30ad723b93ade607a678698e5947a55a4375c3a1 before 9c534dbfd1726502abcf0bd393a04214f62c050b
affected

30ad723b93ade607a678698e5947a55a4375c3a1 before cc336b242ea7e7a09b3ab9f885341455ca0a3bdb
affected

30ad723b93ade607a678698e5947a55a4375c3a1 before 68f27f7c7708183e7873c585ded2f1b057ac5b97
affected

Default status
affected

5.16
affected

Any version before 5.16
unaffected

6.1.154
unaffected

6.6.108
unaffected

6.12.49
unaffected

6.16.9
unaffected

6.17
unaffected

References

git.kernel.org/...c/01d1ba106c9e02a2e7d41e07be49031a0ff0ecaa

git.kernel.org/...c/411f7d4f7038200cdf6d4f71ee31026ebf2dfedb

git.kernel.org/...c/9c534dbfd1726502abcf0bd393a04214f62c050b

git.kernel.org/...c/cc336b242ea7e7a09b3ab9f885341455ca0a3bdb

git.kernel.org/...c/68f27f7c7708183e7873c585ded2f1b057ac5b97

cve.org (CVE-2025-39938)

nvd.nist.gov (CVE-2025-39938)

Download JSON