{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T02:21:03.566","vulnerabilities":[{"cve":{"id":"CVE-2025-40162","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-11-12T11:15:46.347","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus->dai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/095d692e5997ece300c89f10d903d5230090e6a0","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/5726b68473f7153a7f6294185e5998b7e2a230a2","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/a1cccbd19676fc36854535a7118ba2c27d0b84b3","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}