VYPR
Unrated severityNVD Advisory· Published Dec 6, 2025· Updated Apr 15, 2026

CVE-2025-40275

CVE-2025-40275

Description

In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd

In snd_usb_create_streams(), for UAC version 3 devices, the Interface Association Descriptor (IAD) is retrieved via usb_ifnum_to_if(). If this call fails, a fallback routine attempts to obtain the IAD from the next interface and sets a BADD profile. However, snd_usb_mixer_controls_badd() assumes that the IAD retrieved from usb_ifnum_to_if() is always valid, without performing a NULL check. This can lead to a NULL pointer dereference when usb_ifnum_to_if() fails to find the interface descriptor.

This patch adds a NULL pointer check after calling usb_ifnum_to_if() in snd_usb_mixer_controls_badd() to prevent the dereference.

This issue was discovered by syzkaller, which triggered the bug by sending a crafted USB device descriptor.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A NULL pointer dereference in the Linux kernel's ALSA USB audio driver for UAC3 devices can be triggered by a crafted USB descriptor, causing a crash.

Vulnerability

Description

In the Linux kernel, the ALSA USB audio driver's snd_usb_mixer_controls_badd() function assumes that usb_ifnum_to_if() always returns a valid pointer. For UAC3 devices, when the Interface Association Descriptor (IAD) retrieval fails via snd_usb_create_streams(), a fallback routine sets a BADD profile. However, snd_usb_mixer_controls_badd() does not check if usb_ifnum_to_if() returns NULL, leading to a NULL pointer dereference [1].

Exploitation

Prerequisites

The vulnerability can be triggered by a physically present or hot-plugged malicious USB device that provides a crafted USB device descriptor. No authentication or special privileges are required; an attacker only needs the ability to connect a USB device to the target system [1].

Impact

Successful exploitation results in a kernel NULL pointer dereference, causing a system crash (denial of service). The vulnerability does not appear to allow arbitrary code execution; it is limited to causing a kernel oops [1].

Mitigation

The issue was discovered by syzkaller and is fixed in the Linux kernel stable updates. Users should apply the latest kernel patches to prevent exploitation. The fix adds a NULL check after usb_ifnum_to_if() in snd_usb_mixer_controls_badd() [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.