๐Ÿ” CVE Alert

CVE-2025-37979

UNKNOWN 0.0

ASoC: qcom: Fix sc7280 lpass potential buffer overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: Fix sc7280 lpass potential buffer overflow Case values introduced in commit 5f78e1fb7a3e ("ASoC: qcom: Add driver support for audioreach solution") cause out of bounds access in arrays of sc7280 driver data (e.g. in case of RX_CODEC_DMA_RX_0 in sc7280_snd_hw_params()). Redefine LPASS_MAX_PORTS to consider the maximum possible port id for q6dsp as sc7280 driver utilizes some of those values. Found by Linux Verification Center (linuxtesting.org) with SVACE.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 20, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
77d0ffef793da818741127f4905a3e3d45d05ac7 < d78888853eb53f47ae16cf3aa5d0444d0331b9f8 77d0ffef793da818741127f4905a3e3d45d05ac7 < a12c14577882b1f2b4cff0f86265682f16e97b0c 77d0ffef793da818741127f4905a3e3d45d05ac7 < c0ce01e0ff8a0d61a7b089ab309cdc12bc527c39 77d0ffef793da818741127f4905a3e3d45d05ac7 < b807b7c81a6d066757a94af7b8fa5b6a37e4d0b3 77d0ffef793da818741127f4905a3e3d45d05ac7 < a31a4934b31faea76e735bab17e63d02fcd8e029
Linux / Linux
5.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d78888853eb53f47ae16cf3aa5d0444d0331b9f8 git.kernel.org: https://git.kernel.org/stable/c/a12c14577882b1f2b4cff0f86265682f16e97b0c git.kernel.org: https://git.kernel.org/stable/c/c0ce01e0ff8a0d61a7b089ab309cdc12bc527c39 git.kernel.org: https://git.kernel.org/stable/c/b807b7c81a6d066757a94af7b8fa5b6a37e4d0b3 git.kernel.org: https://git.kernel.org/stable/c/a31a4934b31faea76e735bab17e63d02fcd8e029 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html