In the Linux kernel, the following vulnerability has been resolved:
ASoC: qcom: audioreach: fix potential null pointer dereference
It is possible that the topology parsing function audioreachwidgetloadmodulecommon() could return NULL or an error pointer. Add missing NULL check so that we do not dereference it.
[
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c1ad4192f3d2fc85339718a6252cb3337848f7b",
"id": "CVE-2025-40013-3bb1bfa9",
"digest": {
"threshold": 0.9,
"line_hashes": [
"292707441929313586091258103580636656613",
"145087064882039551403984744146257364945",
"37476456173338217501693396784763176075",
"139141706492094684754780761686843309607",
"25339666569623514887086630384851427600"
]
},
"target": {
"file": "sound/soc/qcom/qdsp6/topology.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c1ad4192f3d2fc85339718a6252cb3337848f7b",
"id": "CVE-2025-40013-3c55ee7a",
"digest": {
"function_hash": "61367004606013610721185809082620198759",
"length": 543.0
},
"target": {
"function": "audioreach_widget_load_module_common",
"file": "sound/soc/qcom/qdsp6/topology.c"
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8f9c9fafc0e7a73bbff58954d171c016ddee1734",
"id": "CVE-2025-40013-46deee31",
"digest": {
"threshold": 0.9,
"line_hashes": [
"292707441929313586091258103580636656613",
"145087064882039551403984744146257364945",
"37476456173338217501693396784763176075",
"139141706492094684754780761686843309607",
"25339666569623514887086630384851427600"
]
},
"target": {
"file": "sound/soc/qcom/qdsp6/topology.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ef08ce6304d30b5778035d07b04514cb70839983",
"id": "CVE-2025-40013-9a51de20",
"digest": {
"threshold": 0.9,
"line_hashes": [
"292707441929313586091258103580636656613",
"145087064882039551403984744146257364945",
"37476456173338217501693396784763176075",
"139141706492094684754780761686843309607",
"25339666569623514887086630384851427600"
]
},
"target": {
"file": "sound/soc/qcom/qdsp6/topology.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ef08ce6304d30b5778035d07b04514cb70839983",
"id": "CVE-2025-40013-b034028d",
"digest": {
"function_hash": "61367004606013610721185809082620198759",
"length": 543.0
},
"target": {
"function": "audioreach_widget_load_module_common",
"file": "sound/soc/qcom/qdsp6/topology.c"
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8f9c9fafc0e7a73bbff58954d171c016ddee1734",
"id": "CVE-2025-40013-c468d7eb",
"digest": {
"function_hash": "61367004606013610721185809082620198759",
"length": 543.0
},
"target": {
"function": "audioreach_widget_load_module_common",
"file": "sound/soc/qcom/qdsp6/topology.c"
},
"signature_type": "Function",
"signature_version": "v1"
}
]