CVE-2025-37889
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/05/2025
Last modified:
17/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ASoC: ops: Consistently treat platform_max as control value<br />
<br />
This reverts commit 9bdd10d57a88 ("ASoC: ops: Shift tested values in<br />
snd_soc_put_volsw() by +min"), and makes some additional related<br />
updates.<br />
<br />
There are two ways the platform_max could be interpreted; the maximum<br />
register value, or the maximum value the control can be set to. The<br />
patch moved from treating the value as a control value to a register<br />
one. When the patch was applied it was technically correct as<br />
snd_soc_limit_volume() also used the register interpretation. However,<br />
even then most of the other usages treated platform_max as a<br />
control value, and snd_soc_limit_volume() has since been updated to<br />
also do so in commit fb9ad24485087 ("ASoC: ops: add correct range<br />
check for limiting volume"). That patch however, missed updating<br />
snd_soc_put_volsw() back to the control interpretation, and fixing<br />
snd_soc_info_volsw_range(). The control interpretation makes more<br />
sense as limiting is typically done from the machine driver, so it is<br />
appropriate to use the customer facing representation rather than the<br />
internal codec representation. Update all the code to consistently use<br />
this interpretation of platform_max.<br />
<br />
Finally, also add some comments to the soc_mixer_control struct to<br />
hopefully avoid further patches switching between the two approaches.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.148 (including) | 5.15.180 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.74 (including) | 6.1.132 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.7 (including) | 6.6.84 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7.1 (including) | 6.12.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.7:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.7:rc8:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0eba2a7e858907a746ba69cd002eb9eb4dbd7bf3
- https://git.kernel.org/stable/c/296c8295ae34045da0214882628d49c1c060dd8a
- https://git.kernel.org/stable/c/544055329560d4b64fe204fc6be325ebc24c72ca
- https://git.kernel.org/stable/c/694110bc2407a61f02a770cbb5f39b51e4ec77c6
- https://git.kernel.org/stable/c/a46a9371f8b9a0eeff53a21e11ed3b65f52d9cf6
- https://git.kernel.org/stable/c/c402f184a053c8e7ca325e50f04bbbc1e4fee019
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



