Impact
The Linux kernel’s ASoC rt1011 codec driver contains an error where the spk_mode_put() control mode uses an incorrect helper to retrieve the DAPM context, resulting in a NULL pointer being dereferenced. This flaw can trigger a kernel crash or denial of service when a user triggers the offending control path. The vulnerability does not grant direct code execution, but it can disrupt system availability if exploited.
Affected Systems
All Linux kernel versions that include the rt1011 codec driver and have not yet applied the fix. The exact affected versions are not recorded in the CVE data, so any kernel lacking the patch is potentially vulnerable whenever the rt1011 codec is loaded.
Risk and Exploitability
EPSS data is not available and the flaw is not listed in the CISA KEV catalog, indicating no known public exploits to date. The attack vector is inferred to be local, requiring the ability to interact with the rt1011 driver (e.g., through user‑space control interfaces or a custom kernel module). An attacker would likely need at least root or the capability to load the driver, after which the vulnerable function could be triggered to cause a denial of service. The CVSS score of 5.5 indicates medium severity, reflecting the risk of a kernel panic but limited exploitability beyond the local context.
OpenCVE Enrichment