{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T20:32:41.277","vulnerabilities":[{"cve":{"id":"CVE-2025-40013","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-10-20T16:15:38.057","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: qcom: audioreach: fix potential null pointer dereference\n\nIt is possible that the topology parsing function\naudioreach_widget_load_module_common() could return NULL or an error\npointer. Add missing NULL check so that we do not dereference it."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/4dda55d04caac3b4102c26e29b1c27fa35636be3","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/70e1e5fe9f7e05ff831b56ebc02543e7811b8e18","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/8318e04ab2526b155773313b66a1542476ce1106","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/8f9c9fafc0e7a73bbff58954d171c016ddee1734","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/9c1ad4192f3d2fc85339718a6252cb3337848f7b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/ef08ce6304d30b5778035d07b04514cb70839983","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}