In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() The nullity of sps->cstream should be checked similarly as it is done in sof_set_stream_data_offset() function. Assuming that it is not NULL if sps->stream is NULL is incorrect and can lead to NULL pointer dereference.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025031211-CVE-2025-21847-a72f@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:20095 https://access.redhat.com/errata/RHSA-2025:20095
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:20518 https://access.redhat.com/errata/RHSA-2025:20518