CVE-2025-40085
Description
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
In try_to_register_card(), the return value of usb_ifnum_to_if() is passed directly to usb_interface_claimed() without a NULL check, which will lead to a NULL pointer dereference when creating an invalid USB audio device. Fix this by adding a check to ensure the interface pointer is valid before passing it to usb_interface_claimed().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's ALSA USB-audio driver, a missing NULL check in try_to_register_card() can cause a NULL pointer dereference when an invalid USB audio device is created.
Vulnerability
In the Linux kernel's ALSA USB audio subsystem, the function try_to_register_card() in sound/usb/card.c calls usb_ifnum_to_if() and passes its return value directly to usb_interface_claimed() without verifying that the returned pointer is not NULL. When an invalid USB audio device is presented, usb_ifnum_to_if() can return NULL, leading to a NULL pointer dereference [1][2][3][4].
Exploitation
An attacker with physical access or the ability to connect a malicious USB device can craft an invalid USB audio descriptor that causes the kernel to attempt registration with a non-existent interface number. No special privileges are required beyond the ability to attach a USB device; the vulnerability triggers during the normal enumeration and driver binding process.
Impact
A successful exploit results in a kernel NULL pointer dereference, causing a system crash (denial of service). The vulnerability does not appear to allow arbitrary code execution or privilege escalation based on the available information.
Mitigation
The fix adds a NULL check before calling usb_interface_claimed(), ensuring that a valid interface pointer is present. The patch has been applied to the stable kernel trees [1][2][3][4]. Users should update to a kernel version containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
6736159f7b2968d19a7ab28c7576312eb4363bba7208765d28503ac1a620728412b489b08Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/28412b489b088fb88dff488305fd4e56bd47f6e4nvd
- git.kernel.org/stable/c/576312eb436326b44b7010f4d9ae2b698df075eanvd
- git.kernel.org/stable/c/736159f7b296d7a95f7208eb4799639b1f8b16a0nvd
- git.kernel.org/stable/c/8503ac1a62075a085402e42a386b5c627c821a51nvd
- git.kernel.org/stable/c/8d19a7ab28c7b9c207db5c5282afa8cc8595bcdbnvd
- git.kernel.org/stable/c/bba7208765d26e5e36b87f21dacc2780b064f41fnvd
News mentions
0No linked articles in our index yet.