CVE-2025-39938
BaseFortify
Publication date: 2025-10-04
Last updated on: 2025-10-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | q6apm-lpass-dais | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's ASoC qcom q6apm-lpass-dais driver. It occurs when the opening of the source graph fails (for example, if the ADSP rejects due to incorrect audioreach topology). In this case, the graph is closed and the pointer 'dai_data->graph[dai->id]' is set to NULL. However, the code continues preparing the DAI for the sink graph, and the next call to q6apm_lpass_dai_prepare() receives this NULL pointer, leading to a NULL pointer exception and a kernel error.
How can this vulnerability impact me? :
This vulnerability can cause a kernel NULL pointer dereference, which may lead to a kernel crash or denial of service on affected systems using the vulnerable driver. This can disrupt audio processing functionality and potentially impact system stability.