CVE-2025-68345
Description
In the Linux kernel, the following vulnerability has been resolved:
ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi()
The acpi_get_first_physical_node() function can return NULL, in which case the get_device() function also returns NULL, but this value is then dereferenced without checking,so add a check to prevent a crash.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A NULL pointer dereference in Linux kernel's cs35l41 HDA driver can crash the system when ACPI provides no physical device node.
Vulnerability
Description
In the Linux kernel ALSA HDA driver for the Cirrus Logic cs35l41 amplifier, the function cs35l41_hda_read_acpi() can trigger a NULL pointer dereference. The issue arises because acpi_get_first_physical_node() may return NULL, and the subsequent get_device() call also returns NULL without a check. This unchecked NULL pointer is then dereferenced, leading to a kernel crash [1][2].
Exploitation
Path
The vulnerability is triggered during ACPI table parsing when the system boots or when the cs35l41 driver probes a device that lacks a valid physical node. An attacker would need to have local access or the ability to influence ACPI tables to cause the driver to encounter a device without a physical node. No authentication is required beyond local system access, as the driver runs in kernel context [1][2].
Impact
Successful exploitation results in a denial of service (system crash) due to a NULL pointer dereference. There is no indication of privilege escalation or data leakage; the impact is limited to availability [1][2].
Mitigation
The fix adds a NULL check before dereferencing the pointer returned by acpi_get_first_physical_node(), preventing the crash. The patch has been applied to the stable kernel tree and is available in commits referenced in the advisory [1][2]. Users should update to a kernel version containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- git.kernel.org/stable/c/343fa9800cf9870ec681e21f0a6f2157b74ae520nvd
- git.kernel.org/stable/c/7a35a505d76a4b6cd426b59ff2d800d0394cc5d3nvd
- git.kernel.org/stable/c/c28946b7409b7b68fb0481ec738c8b04578b11c6nvd
- git.kernel.org/stable/c/c34b04cc6178f33c08331568c7fd25c5b9a39f66nvd
- git.kernel.org/stable/c/e63f9c81ca28b06eeeac3630faddc50717897351nvd
- git.kernel.org/stable/c/e6ba921b17797ccc545d80e0dbccb5fab91c248cnvd
News mentions
0No linked articles in our index yet.