Description
In the Linux kernel, the following vulnerability has been resolved:

ASoC: SDCA: Add allocation failure check for Entity name

Currently find_sdca_entity_iot() can allocate a string for the
Entity name but it doesn't check if that allocation succeeded.
Add the missing NULL check after the allocation.
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (kernel crash)
Action: Patch Immediately
AI Analysis

Impact

The Linux kernel contains a logic flaw in the ASoC SDCA subsystem where the helper function for allocating an entity name does not verify that the memory allocation succeeded. If the allocation fails, a NULL pointer dereference can occur, causing an OOPS and potentially bringing the entire system down. This is a classic null pointer dereference weakness (CWE‑252) that impacts system reliability rather than providing direct remote code execution.

Affected Systems

All Linux kernel versions prior to the patch commit referenced in the advisory are affected. The vulnerability applies to the support for Single Device Clock Administration (SDCA) under the Advanced SoC (ASoC) audio subsystem. Users running any unpatched Linux distribution that includes the vulnerable kernel code are at risk. Vendor/vendor combination "Linux:Linux" indicates the kernel itself, with no specific application or driver product name listed.

Risk and Exploitability

The CVSS score of 5.5 reflects a moderate severity, and the EPSS score of less than 1% suggests that automated exploitation is unlikely at this time. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog, indicating no known public exploits. The likely attack vector would require interaction with the audio subsystem's SDCA interface, possibly via an application that can trigger the allocation path; however, this is inferred from the code context rather than stated explicitly in the advisory. Security professionals should consider the risk as moderate but non‑critical, pending a patch.

Generated by OpenCVE AI on March 26, 2026 at 14:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the vulnerable function fix or apply the patch from the referenced commits
  • Reboot the system after the kernel update to ensure the new code is active
  • Verify the running kernel version with "uname -r" to confirm the patch is in place
  • If an immediate kernel update is impossible, limit exposure by preventing unprivileged users from accessing SDCA devices or disabling the audio subsystem until a patch can be applied
  • Monitor vendor channels and update feeds for any future vulnerability disclosures or additional mitigation guidance

Generated by OpenCVE AI on March 26, 2026 at 14:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Thu, 26 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-252
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ASoC: SDCA: Add allocation failure check for Entity name Currently find_sdca_entity_iot() can allocate a string for the Entity name but it doesn't check if that allocation succeeded. Add the missing NULL check after the allocation.
Title ASoC: SDCA: Add allocation failure check for Entity name
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:03:56.611Z

Reserved: 2026-01-13T15:37:45.993Z

Link: CVE-2026-23301

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T11:16:25.803

Modified: 2026-03-25T15:41:33.977

Link: CVE-2026-23301

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23301 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:50:05Z

Weaknesses