[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025103017-CVE-2025-40098-7f8f@gregkh>
Date: Thu, 30 Oct 2025 10:48:25 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()
Return value of a function acpi_evaluate_dsm() is dereferenced  without
checking for NULL, but it is usually checked for this function.
acpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns
acpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
The Linux kernel CVE team has assigned CVE-2025-40098 to this issue.
Affected and fixed versions
===========================
	Issue introduced in 6.7 with commit 447106e92a0c86c332d40710436f38f64c322cd6 and fixed in 6.17.5 with commit b518386db2b993d786c431caa9f46ce063c5cb05
	Issue introduced in 6.7 with commit 447106e92a0c86c332d40710436f38f64c322cd6 and fixed in 6.18-rc2 with commit 8527bbb33936340525a3504a00932b2f8fd75754
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-40098
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
	sound/hda/codecs/side-codecs/cs35l41_hda.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/b518386db2b993d786c431caa9f46ce063c5cb05
	https://git.kernel.org/stable/c/8527bbb33936340525a3504a00932b2f8fd75754
Powered by blists - more mailing lists
 
