Impact
The Linux kernel contains a logic flaw in the ASoC SDCA subsystem where the helper function for allocating an entity name does not verify that the memory allocation succeeded. If the allocation fails, a NULL pointer dereference can occur, causing an OOPS and potentially bringing the entire system down. This is a classic null pointer dereference weakness (CWE‑252) that impacts system reliability rather than providing direct remote code execution.
Affected Systems
All Linux kernel versions prior to the patch commit referenced in the advisory are affected. The vulnerability applies to the support for Single Device Clock Administration (SDCA) under the Advanced SoC (ASoC) audio subsystem. Users running any unpatched Linux distribution that includes the vulnerable kernel code are at risk. Vendor/vendor combination "Linux:Linux" indicates the kernel itself, with no specific application or driver product name listed.
Risk and Exploitability
The CVSS score of 5.5 reflects a moderate severity, and the EPSS score of less than 1% suggests that automated exploitation is unlikely at this time. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog, indicating no known public exploits. The likely attack vector would require interaction with the audio subsystem's SDCA interface, possibly via an application that can trigger the allocation path; however, this is inferred from the code context rather than stated explicitly in the advisory. Security professionals should consider the risk as moderate but non‑critical, pending a patch.
OpenCVE Enrichment