Bug 2414467 (CVE-2025-40162)

Summary: CVE-2025-40162 kernel: ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the Linux kernel's AMD SoundWire utilities in the ASoC subsystem. In the sdw_utils code, devm_kasprintf() may return NULL on memory allocation failure. However, a debug message attempts to print the cpus->dai_name value before the NULL check is performed. If memory allocation fails, this results in a NULL pointer dereference. While this typically requires memory pressure to trigger, it could cause a kernel crash during audio device initialization.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2025-11-12 11:01:35 UTC
In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails

devm_kasprintf() may return NULL on memory allocation failure,
but the debug message prints cpus->dai_name before checking it.
Move the dev_dbg() call after the NULL check to prevent potential
NULL pointer dereference.