Executive Summary

Informations
Name CVE-2025-21847 First vendor Publication 2025-03-12
Vendor Cve Last vendor Modification 2025-03-13

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data()

The nullity of sps->cstream should be checked similarly as it is done in sof_set_stream_data_offset() function. Assuming that it is not NULL if sps->stream is NULL is incorrect and can lead to NULL pointer dereference.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21847

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3688

Sources (Detail)

https://git.kernel.org/stable/c/2b3878baf90918a361a3dfd3513025100b1b40b6
https://git.kernel.org/stable/c/62ab1ae5511c59b5f0bf550136ff321331adca9f
https://git.kernel.org/stable/c/6c18f5eb2043ebf4674c08a9690218dc818a11ab
https://git.kernel.org/stable/c/d8d99c3b5c485f339864aeaa29f76269cc0ea975
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2025-03-14 00:20:48
  • Multiple Updates
2025-03-13 21:20:39
  • Multiple Updates
2025-03-12 13:20:39
  • First insertion