VYPR
Unrated severityNVD Advisory· Published Oct 20, 2025· Updated Apr 15, 2026

CVE-2025-40013

CVE-2025-40013

Description

In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: audioreach: fix potential null pointer dereference

It is possible that the topology parsing function audioreach_widget_load_module_common() could return NULL or an error pointer. Add missing NULL check so that we do not dereference it.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing NULL check in the Linux kernel's ASoC audioreach driver can lead to a null pointer dereference when parsing a crafted audio topology.

Vulnerability

Description

In the Linux kernel's ASoC Qualcomm audioreach driver, the function audioreach_widget_load_module_common() may return a NULL or an error pointer when parsing a topology. However, the calling code did not validate the return value before dereferencing it. This missing NULL check creates a potential null pointer dereference vulnerability [1].

Exploitation

Prerequisites

An attacker would need to supply a specially crafted audio topology to the kernel's sound subsystem. This likely requires local access or the ability to load a custom topology through ALSA controls, though no specific authentication barrier is mentioned in the disclosure. The flaw resides in kernel code that processes topology data, making it reachable during normal audio configuration.

Impact

If triggered, the null pointer dereference causes a kernel crash (oops/panic), leading to a denial of service. The description does not indicate that the vulnerability enables privilege escalation or arbitrary code execution.

Mitigation

The fix adds a missing NULL check and was applied in the mainline kernel via commit [1]. It has also been backported to multiple stable kernel branches, as seen in commits [2], [3], and [4]. Users should apply the latest stable kernel updates containing these patches.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

3

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.