In the Linux kernel, the following vulnerability has been resolved:
ASoC: amd/sdwutils: avoid NULL deref when devmkasprintf() fails
devmkasprintf() may return NULL on memory allocation failure, but the debug message prints cpus->dainame before checking it. Move the dev_dbg() call after the NULL check to prevent potential NULL pointer dereference.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40162.json"
}