Wind River Support Network

HomeDefectsLIN1023-16232
Acknowledged

LIN1023-16232 : Security Advisory - linux - CVE-2025-39938

Created: Oct 10, 2025    Updated: Oct 17, 2025
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed[EOL][EOL]If earlier opening of source graph fails (e.g. ADSP rejects due to[EOL]incorrect audioreach topology), the graph is closed and[EOL]"dai_data->graph[dai->id]" is assigned NULL.  Preparing the DAI for sink[EOL]graph continues though and next call to q6apm_lpass_dai_prepare()[EOL]receives dai_data->graph[dai->id]=NULL leading to NULL pointer[EOL]exception:[EOL][EOL]  qcom-apm gprsvc:service:2:1: Error (1) Processing 0x01001002 cmd[EOL]  qcom-apm gprsvc:service:2:1: DSP returned error[1001002] 1[EOL]  q6apm-lpass-dais 30000000.remoteproc:glink-edge:gpr:service@1:bedais: fail to start APM port 78[EOL]  q6apm-lpass-dais 30000000.remoteproc:glink-edge:gpr:service@1:bedais: ASoC: error at snd_soc_pcm_dai_prepare on TX_CODEC_DMA_TX_3: -22[EOL]  Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a8[EOL]  ...[EOL]  Call trace:[EOL]   q6apm_graph_media_format_pcm+0x48/0x120 (P)[EOL]   q6apm_lpass_dai_prepare+0x110/0x1b4[EOL]   snd_soc_pcm_dai_prepare+0x74/0x108[EOL]   __soc_pcm_prepare+0x44/0x160[EOL]   dpcm_be_dai_prepare+0x124/0x1c0
Live chat
Online