CVE-2025-37919

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-37919
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37919.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37919
Downstream
Published
2025-05-20T15:21:49Z
Modified
2025-10-18T01:03:58.613021Z
Summary
ASoC: amd: acp: Fix NULL pointer deref in acp_i2s_set_tdm_slot
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd: acp: Fix NULL pointer deref in acpi2ssettdmslot

Update chip data using devgetdrvdata(dev->parent) to fix NULL pointer deref in acpi2ssettdmslot.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cd60dec8994cf0626faf80a67be9350ae335f7e9
Fixed
3104b7d559ffb28f34e55028ff55a475e26e2e1e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cd60dec8994cf0626faf80a67be9350ae335f7e9
Fixed
fd4d8d139030dd2de97ef46d332673675ca8ad72
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cd60dec8994cf0626faf80a67be9350ae335f7e9
Fixed
6d9b64156d849e358cb49b6b899fb0b7d262bda8

Affected versions

v6.*

v6.11
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.10
v6.12.11
v6.12.12
v6.12.13
v6.12.14
v6.12.15
v6.12.16
v6.12.17
v6.12.18
v6.12.19
v6.12.2
v6.12.20
v6.12.21
v6.12.22
v6.12.23
v6.12.24
v6.12.25
v6.12.26
v6.12.27
v6.12.3
v6.12.4
v6.12.5
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.14.1
v6.14.2
v6.14.3
v6.14.4
v6.14.5
v6.15-rc1
v6.15-rc2

Database specific

vanir_signatures

[
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fd4d8d139030dd2de97ef46d332673675ca8ad72",
        "signature_version": "v1",
        "id": "CVE-2025-37919-16acea07",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "285828802652938321366275639086630803940",
                "175842635375217439100957682631835524108",
                "118969243871914840344261998801804631842",
                "1935528238442187277415661745670902272"
            ]
        },
        "target": {
            "file": "sound/soc/amd/acp/acp-i2s.c"
        }
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3104b7d559ffb28f34e55028ff55a475e26e2e1e",
        "signature_version": "v1",
        "id": "CVE-2025-37919-1a1c580a",
        "digest": {
            "function_hash": "31106831357807952158598973645433467188",
            "length": 2060.0
        },
        "target": {
            "function": "acp_i2s_set_tdm_slot",
            "file": "sound/soc/amd/acp/acp-i2s.c"
        }
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6d9b64156d849e358cb49b6b899fb0b7d262bda8",
        "signature_version": "v1",
        "id": "CVE-2025-37919-310f102e",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "285828802652938321366275639086630803940",
                "175842635375217439100957682631835524108",
                "118969243871914840344261998801804631842",
                "1935528238442187277415661745670902272"
            ]
        },
        "target": {
            "file": "sound/soc/amd/acp/acp-i2s.c"
        }
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6d9b64156d849e358cb49b6b899fb0b7d262bda8",
        "signature_version": "v1",
        "id": "CVE-2025-37919-3ffd741e",
        "digest": {
            "function_hash": "258741197159668202853251193593021480795",
            "length": 2061.0
        },
        "target": {
            "function": "acp_i2s_set_tdm_slot",
            "file": "sound/soc/amd/acp/acp-i2s.c"
        }
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fd4d8d139030dd2de97ef46d332673675ca8ad72",
        "signature_version": "v1",
        "id": "CVE-2025-37919-96a4bf37",
        "digest": {
            "function_hash": "88183415328937421401549969056062563130",
            "length": 2096.0
        },
        "target": {
            "function": "acp_i2s_set_tdm_slot",
            "file": "sound/soc/amd/acp/acp-i2s.c"
        }
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3104b7d559ffb28f34e55028ff55a475e26e2e1e",
        "signature_version": "v1",
        "id": "CVE-2025-37919-fca1337a",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "285828802652938321366275639086630803940",
                "175842635375217439100957682631835524108",
                "118969243871914840344261998801804631842",
                "1935528238442187277415661745670902272"
            ]
        },
        "target": {
            "file": "sound/soc/amd/acp/acp-i2s.c"
        }
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.12.0
Fixed
6.12.28
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.14.6