CVE-2025-39959
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-09

Last updated on: 2026-02-26

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: acp: Fix incorrect retrival of acp_chip_info Use dev_get_drvdata(dev->parent) instead of dev_get_platdata(dev) to correctly obtain acp_chip_info members in the acp I2S driver. Previously, some members were not updated properly due to incorrect data access, which could potentially lead to null pointer dereferences. This issue was missed in the earlier commit ("ASoC: amd: acp: Fix NULL pointer deref in acp_i2s_set_tdm_slot"), which only addressed set_tdm_slot(). This change ensures that all relevant functions correctly retrieve acp_chip_info, preventing further null pointer dereference issues.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-09
Last Modified
2026-02-26
Generated
2026-05-06
AI Q&A
2025-10-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
linux linux_kernel 6.17
linux linux_kernel From 6.15 (inc) to 6.16.9 (inc)
amd linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's AMD ACP I2S driver was caused by incorrect retrieval of acp_chip_info data using dev_get_platdata(dev) instead of dev_get_drvdata(dev->parent). This led to some members not being updated properly, potentially causing null pointer dereferences. The fix ensures that all relevant functions correctly obtain acp_chip_info to prevent these null pointer dereference issues.


How can this vulnerability impact me? :

The vulnerability could lead to null pointer dereferences in the AMD ACP I2S driver, which may cause system instability or crashes when the affected driver functions are executed. This could impact the reliability of audio-related functionality on affected Linux systems.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for correct retrieval of acp_chip_info in the acp I2S driver. This fix replaces dev_get_platdata(dev) with dev_get_drvdata(dev->parent) to prevent null pointer dereferences. Applying the latest kernel patches or updates from your Linux distribution that address this issue is recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart