CVE-2023-53275
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
16/09/2025
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()<br />
<br />
The variable codec->regmap is often protected by the lock<br />
codec->regmap_lock when is accessed. However, it is accessed without<br />
holding the lock when is accessed in snd_hdac_regmap_sync():<br />
<br />
if (codec->regmap)<br />
<br />
In my opinion, this may be a harmful race, because if codec->regmap is<br />
set to NULL right after the condition is checked, a null-pointer<br />
dereference can occur in the called function regcache_sync():<br />
<br />
map->lock(map->lock_arg); --> Line 360 in drivers/base/regmap/regcache.c<br />
<br />
To fix this possible null-pointer dereference caused by data race, the<br />
mutex_lock coverage is extended to protect the if statement as well as the<br />
function call to regcache_sync().<br />
<br />
[ Note: the lack of the regmap_lock itself is harmless for the current<br />
codec driver implementations, as snd_hdac_regmap_sync() is only for<br />
PM runtime resume that is prohibited during the codec probe.<br />
But the change makes the whole code more consistent, so it&#39;s merged<br />
as is -- tiwai ]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.255 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.192 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.128 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.47 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.4.12 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/109f0aaa0b8838a88af9125b79579023539300a7
- https://git.kernel.org/stable/c/1f4a08fed450db87fbb5ff5105354158bdbe1a22
- https://git.kernel.org/stable/c/8703b26387e1fa4f8749db98d24c67617b873acb
- https://git.kernel.org/stable/c/9f9eed451176ffcac6b5ba0f6dae1a6b4a1cb0eb
- https://git.kernel.org/stable/c/b32e40379e5b2814de0c4bc199edc2d82317dc07
- https://git.kernel.org/stable/c/cdd412b528dee6e0851c4735d6676ec138da13a4



