CVE-2025-37919

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's AMD ACP audio driver allows local attackers to cause a kernel panic (system crash) or potentially execute arbitrary code. This affects systems running vulnerable Linux kernel versions with AMD ACP audio hardware. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches exist in stable kernel trees.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AMD ACP audio hardware and the affected driver to be loaded/enabled.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution leading to complete system compromise.

🟠

Likely Case

Kernel panic causing system crash and denial of service.

🟢

If Mitigated

Limited to denial of service if kernel protections prevent code execution.

🌐 Internet-Facing: LOW - Requires local access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers could crash systems or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger the vulnerable function. No public exploit available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in stable kernel commits: 3104b7d559ffb28f34e55028ff55a475e26e2e1e, 6d9b64156d849e358cb49b6b899fb0b7d262bda8, fd4d8d139030dd2de97ef46d332673675ca8ad72

Vendor Advisory: https://git.kernel.org/stable/c/3104b7d559ffb28f34e55028ff55a475e26e2e1e

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check with your distribution for security updates. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable AMD ACP audio driver

linux

Prevent loading of the vulnerable driver module

echo 'blacklist snd_soc_amd_acp' >> /etc/modprobe.d/blacklist.conf
rmmod snd_soc_amd_acp

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable kernel
  • Implement kernel hardening features like KASLR and SMEP/SMAP

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if AMD ACP audio driver is loaded: lsmod | grep snd_soc_amd_acp

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and driver loads without issues

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • NULL pointer dereference errors in dmesg/kernel logs

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for kernel panic events or NULL pointer dereference in system logs

🔗 References

📤 Share & Export