Skip to main content

CVE-2025-37919: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-37919cvecve-2025-37919
Published: Tue May 20 2025 (05/20/2025, 15:21:49 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: acp: Fix NULL pointer deref in acp_i2s_set_tdm_slot Update chip data using dev_get_drvdata(dev->parent) to fix NULL pointer deref in acp_i2s_set_tdm_slot.

AI-Powered Analysis

AILast updated: 07/04/2025, 01:39:47 UTC

Technical Analysis

CVE-2025-37919 is a vulnerability identified in the Linux kernel specifically within the ALSA System on Chip (ASoC) driver for AMD's Audio Co-Processor (ACP) interface. The issue arises in the function acp_i2s_set_tdm_slot, which is responsible for configuring Time-Division Multiplexing (TDM) slots for audio data transmission. The vulnerability is a NULL pointer dereference caused by improper handling of device driver data retrieval. Specifically, the driver attempts to update chip data using dev_get_drvdata(dev->parent), but under certain conditions, this pointer can be NULL, leading to a dereference of a NULL pointer. This results in a kernel crash (denial of service) or potential system instability. The patch fixes this by ensuring the pointer is valid before use. The vulnerability affects certain versions of the Linux kernel identified by the commit hash cd60dec8994cf0626faf80a67be9350ae335f7e9. There are no known exploits in the wild at the time of publication (May 20, 2025), and no CVSS score has been assigned yet. The vulnerability does not require user interaction but does require the vulnerable driver to be present and invoked, which is typical in systems using AMD ACP audio hardware. The impact is primarily a denial of service through kernel crash, but depending on the context, it could be leveraged for privilege escalation or other attacks if combined with other vulnerabilities.

Potential Impact

For European organizations, the impact of CVE-2025-37919 depends largely on the deployment of Linux-based systems utilizing AMD ACP audio hardware. Many enterprise servers, workstations, and embedded devices in sectors such as telecommunications, manufacturing, and media production run Linux kernels that might include the affected driver. A successful exploitation could cause system crashes, leading to service interruptions and potential data loss. In critical infrastructure or industrial control systems, this could disrupt operations. While no direct evidence suggests privilege escalation, kernel crashes can be a stepping stone for attackers to gain further access. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in widely used Linux kernels means that organizations should prioritize patching to maintain system stability and security.

Mitigation Recommendations

Organizations should promptly apply the official Linux kernel patches that address this NULL pointer dereference in the ASoC AMD ACP driver. Specifically, updating to a kernel version that includes the fix identified by the commit cd60dec8994cf0626faf80a67be9350ae335f7e9 is critical. System administrators should audit their Linux systems to identify those running AMD ACP audio drivers and verify if they are on vulnerable kernel versions. For systems where immediate patching is not feasible, disabling or unloading the affected ASoC AMD ACP modules can mitigate risk, though this may impact audio functionality. Additionally, monitoring system logs for kernel oops or crashes related to the acp_i2s_set_tdm_slot function can help detect attempted exploitation or instability. Incorporating this vulnerability into vulnerability management and patch cycles will ensure timely remediation. Finally, organizations should maintain robust backup and recovery procedures to minimize disruption from potential denial-of-service incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.968Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeaf7d

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 1:39:47 AM

Last updated: 7/31/2025, 9:30:44 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats