
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a use-after-free vulnerability was discovered in the ASoC SOF Intel HDA component. The issue occurs when hda_generic_machine_select() appends -idisp to the tplg filename by allocating a new string with devm_kasprintf() and storing it in the global variable snd_soc_acpi_intel_hda_machines. The vulnerability was disclosed on June 18, 2025 (NVD).
The vulnerability is triggered when reloading the module, which causes a use-after-free read condition in the string+0x48/0xe0 function. When the module is unloaded, the memory is freed, resulting in a global variable pointing to freed memory. The bug was detected by KFENCE (Kernel Electric-Fence) showing the memory was allocated by task 333 on cpu 8 and later freed by task 1543 on cpu 4 (NVD, Wiz).
This use-after-free vulnerability could lead to memory corruption in the Linux kernel. When exploited, it could potentially result in system crashes, information leaks, or possible privilege escalation in the context of the kernel (Wiz).
The vulnerability has been patched by modifying the code to copy the match array with devm_kmemdup_array() before any modifications are made. Users should update their Linux kernel to a version containing this fix (Wiz).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."