VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2025-40338

CVE-2025-40338

Description

In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: avs: Do not share the name pointer between components

By sharing 'name' directly, tearing down components may lead to use-after-free errors. Duplicate the name to avoid that.

At the same time, update the order of operations - since commit cee28113db17 ("ASoC: dmaengine_pcm: Allow passing component name via config") the framework does not override component->name if set before invoking the initializer.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Intel ASoC avs driver due to shared component name pointer; fixed by duplicating the name string.

Vulnerability

The vulnerability is a use-after-free in the Intel ASoC avs driver. The root cause is that the driver shares the 'name' pointer between components without duplication. When tearing down components, this shared pointer can become invalid, leading to use-after-free errors [1].

Exploitation

An attacker would need to trigger component removal, typically through a crafted audio configuration or device removal. Exploitation does not require authentication if the attacker can interact with the audio subsystem from user space [1].

Impact

An attacker exploiting this could cause a kernel crash (denial of service) or potentially execute arbitrary code in kernel context, leading to privilege escalation [1].

Mitigation

The fix duplicates the name pointer to avoid use-after-free. Additionally, the order of operations was updated to prevent the framework from overriding the component name [1]. The patch is available in the stable kernel tree [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)range: >= 6.10 (approx. based on commit timestamps)

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.