Impact
The vulnerability arises from an incorrect removal order in the Qualcomm Digital Signal Processor (ADSP) ASoC framework. During an ADSP stop and subsequent start, the q6apm‑audio component’s remove callback unloads topology and removes PCM runtime devices while dependent Digital Audio Interfaces (DAIs) are still referenced by the card. This sequence deletes the runtime data structures before the child components are fully detached, leading the next rebind operation to dereference a null pointer and crash the kernel. The crash manifests as a NULL pointer dereference at address 0x0, producing a kernel oops and potentially resulting in service disruption for any application relying on the audio subsystem.
Affected Systems
This issue affects Linux kernels running on Qualcomm platforms that use the q6apm audio device and its associated DAI components, such as the Lemans EVK device running a 6.19.0-rc6-dirty kernel. All earlier kernel releases that maintain the same removal logic are also impacted, regardless of the specific Linux distribution. The problem is limited to the Qualcomm ASoC subsystems and does not extend to generic Linux kernel components.
Risk and Exploitability
The vulnerability is not listed in the CISA KEV catalog and no EPSS score is available, indicating that it is currently not a widely exploited target. However, the defect causes a kernel crash, a severe impact that would allow an attacker to block system functionality or cause a reboot if they can trigger an ADSP stop/start sequence on an affected device. Based on the description, exploitation would require access to the audio subsystem or a custom firmware that exercises the ADSP stop/start cycle, which are realistic in embedded or carrier‑grade environments. The risk can therefore be considered significant, especially in scenarios where the affected hardware is in active use.
OpenCVE Enrichment