CVE-2023-53275
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-16

Last updated on: 2025-12-03

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() The variable codec->regmap is often protected by the lock codec->regmap_lock when is accessed. However, it is accessed without holding the lock when is accessed in snd_hdac_regmap_sync(): if (codec->regmap) In my opinion, this may be a harmful race, because if codec->regmap is set to NULL right after the condition is checked, a null-pointer dereference can occur in the called function regcache_sync(): map->lock(map->lock_arg); --> Line 360 in drivers/base/regmap/regcache.c To fix this possible null-pointer dereference caused by data race, the mutex_lock coverage is extended to protect the if statement as well as the function call to regcache_sync(). [ Note: the lack of the regmap_lock itself is harmless for the current codec driver implementations, as snd_hdac_regmap_sync() is only for PM runtime resume that is prohibited during the codec probe. But the change makes the whole code more consistent, so it's merged as is -- tiwai ]
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-16
Last Modified
2025-12-03
Generated
2026-05-07
AI Q&A
2025-09-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
linux linux_kernel to 5.4.255 (exc)
linux linux_kernel From 5.5 (inc) to 5.10.192 (exc)
linux linux_kernel From 5.11 (inc) to 5.15.128 (exc)
linux linux_kernel From 5.16 (inc) to 6.1.47 (exc)
linux linux_kernel From 6.2 (inc) to 6.4.12 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a possible null-pointer dereference in the Linux kernel's ALSA hda driver. It occurs because the variable codec->regmap is accessed without holding its protecting lock in the function snd_hdac_regmap_sync(). If codec->regmap is set to NULL right after the check, a null-pointer dereference can happen in the regcache_sync() function, potentially causing a crash or undefined behavior. The fix extends the mutex lock coverage to protect both the check and the function call, preventing this race condition.


How can this vulnerability impact me? :

This vulnerability can lead to a null-pointer dereference in the Linux kernel, which may cause system crashes or instability when the affected ALSA hda driver code is executed. This could impact system reliability and availability, especially during power management runtime resume operations.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version where the fix for the null-pointer dereference in snd_hdac_regmap_sync() has been applied. This fix extends mutex_lock coverage to protect the critical section, preventing the data race. Avoid using vulnerable kernel versions and apply security patches as soon as they are available.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart