In the Linux kernel, the following vulnerability has been resolved:
ASoC: SOF: stream-ipc: Check for cstream nullity in sofipcmsg_data()
The nullity of sps->cstream should be checked similarly as it is done in sofsetstreamdataoffset() function. Assuming that it is not NULL if sps->stream is NULL is incorrect and can lead to NULL pointer dereference.
[
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "sound/soc/sof/stream-ipc.c"
},
"digest": {
"line_hashes": [
"35088763365664184172925708184175557238",
"52451002438406795846002120438213377709",
"288779136264254499111234348857609287007",
"338359147751673602187676209431874141451",
"70084309930705923525115259683513868918",
"241699954557021016086276719539724258821",
"60965043804149851759760412117530216621",
"206545699896795325820056363135121544359"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2b3878baf90918a361a3dfd3513025100b1b40b6",
"signature_version": "v1",
"id": "CVE-2025-21847-06faa607"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "sound/soc/sof/stream-ipc.c",
"function": "sof_ipc_msg_data"
},
"digest": {
"length": 538.0,
"function_hash": "223665294876003773150919600997371967860"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2b3878baf90918a361a3dfd3513025100b1b40b6",
"signature_version": "v1",
"id": "CVE-2025-21847-08717984"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "sound/soc/sof/stream-ipc.c"
},
"digest": {
"line_hashes": [
"35088763365664184172925708184175557238",
"52451002438406795846002120438213377709",
"288779136264254499111234348857609287007",
"338359147751673602187676209431874141451",
"70084309930705923525115259683513868918",
"241699954557021016086276719539724258821",
"60965043804149851759760412117530216621",
"206545699896795325820056363135121544359"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d8d99c3b5c485f339864aeaa29f76269cc0ea975",
"signature_version": "v1",
"id": "CVE-2025-21847-6afbebbc"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "sound/soc/sof/stream-ipc.c"
},
"digest": {
"line_hashes": [
"35088763365664184172925708184175557238",
"52451002438406795846002120438213377709",
"288779136264254499111234348857609287007",
"338359147751673602187676209431874141451",
"70084309930705923525115259683513868918",
"241699954557021016086276719539724258821",
"60965043804149851759760412117530216621",
"206545699896795325820056363135121544359"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@62ab1ae5511c59b5f0bf550136ff321331adca9f",
"signature_version": "v1",
"id": "CVE-2025-21847-b02c1d3c"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "sound/soc/sof/stream-ipc.c",
"function": "sof_ipc_msg_data"
},
"digest": {
"length": 538.0,
"function_hash": "223665294876003773150919600997371967860"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@62ab1ae5511c59b5f0bf550136ff321331adca9f",
"signature_version": "v1",
"id": "CVE-2025-21847-c22e8c97"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "sound/soc/sof/stream-ipc.c",
"function": "sof_ipc_msg_data"
},
"digest": {
"length": 538.0,
"function_hash": "223665294876003773150919600997371967860"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d8d99c3b5c485f339864aeaa29f76269cc0ea975",
"signature_version": "v1",
"id": "CVE-2025-21847-dda6f25c"
}
]