Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43137
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:27
Updated At-11 May, 2026 | 22:18
Rejected At-
▼CVE Numbering Authority (CNA)
ASoC: SOF: Intel: hda: Fix NULL pointer dereference

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda: Fix NULL pointer dereference If there's a mismatch between the DAI links in the machine driver and the topology, it is possible that the playback/capture widget is not set, especially in the case of loopback capture for echo reference where we use the dummy DAI link. Return the error when the widget is not set to avoid a null pointer dereference like below when the topology is broken. RIP: 0010:hda_dai_get_ops.isra.0+0x14/0xa0 [snd_sof_intel_hda_common]

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • sound/soc/sof/intel/hda-dai.c
Default Status
unaffected
Versions
Affected
  • From 0acb48dd31e39b617bb12ca546b4fecd6ccb2972 before 10411f1f2c76be67103b1f95822ff629aa25e2aa (git)
  • From 0acb48dd31e39b617bb12ca546b4fecd6ccb2972 before 42068f7dd42b559c4eeae645e1455ff36518866a (git)
  • From 0acb48dd31e39b617bb12ca546b4fecd6ccb2972 before 7750d78b4014902bc0ac03d4bb30faa076a913ab (git)
  • From 0acb48dd31e39b617bb12ca546b4fecd6ccb2972 before 16c589567a956d46a7c1363af3f64de3d420af20 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • sound/soc/sof/intel/hda-dai.c
Default Status
affected
Versions
Affected
  • 5.16
Unaffected
  • From 0 before 5.16 (semver)
  • From 6.12.75 through 6.12.* (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/10411f1f2c76be67103b1f95822ff629aa25e2aa
N/A
https://git.kernel.org/stable/c/42068f7dd42b559c4eeae645e1455ff36518866a
N/A
https://git.kernel.org/stable/c/7750d78b4014902bc0ac03d4bb30faa076a913ab
N/A
https://git.kernel.org/stable/c/16c589567a956d46a7c1363af3f64de3d420af20
N/A
Hyperlink: https://git.kernel.org/stable/c/10411f1f2c76be67103b1f95822ff629aa25e2aa
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/42068f7dd42b559c4eeae645e1455ff36518866a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7750d78b4014902bc0ac03d4bb30faa076a913ab
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/16c589567a956d46a7c1363af3f64de3d420af20
Resource: N/A
Details not found