Bug 2414494 (CVE-2025-40154) - CVE-2025-40154 kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
Summary: CVE-2025-40154 kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input map...
Keywords:
Status: NEW
Alias: CVE-2025-40154
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-11-12 11:03 UTC by OSIDB Bzimport
Modified: 2026-02-12 15:12 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:0804 0 None None None 2026-01-19 13:14:59 UTC
Red Hat Product Errata RHSA-2026:0917 0 None None None 2026-01-21 09:39:41 UTC
Red Hat Product Errata RHSA-2026:1142 0 None None None 2026-01-26 13:31:55 UTC
Red Hat Product Errata RHSA-2026:1148 0 None None None 2026-01-26 07:44:08 UTC
Red Hat Product Errata RHSA-2026:1236 0 None None None 2026-01-26 16:23:34 UTC
Red Hat Product Errata RHSA-2026:1441 0 None None None 2026-01-28 00:29:53 UTC
Red Hat Product Errata RHSA-2026:1443 0 None None None 2026-01-28 00:23:04 UTC
Red Hat Product Errata RHSA-2026:1494 0 None None None 2026-01-28 15:08:09 UTC
Red Hat Product Errata RHSA-2026:1495 0 None None None 2026-01-28 15:04:25 UTC
Red Hat Product Errata RHSA-2026:1617 0 None None None 2026-02-02 00:46:42 UTC
Red Hat Product Errata RHSA-2026:1690 0 None None None 2026-02-02 09:50:36 UTC
Red Hat Product Errata RHSA-2026:1886 0 None None None 2026-02-04 09:03:51 UTC
Red Hat Product Errata RHSA-2026:2490 0 None None None 2026-02-11 00:16:04 UTC
Red Hat Product Errata RHSA-2026:2535 0 None None None 2026-02-11 11:50:52 UTC
Red Hat Product Errata RHSA-2026:2664 0 None None None 2026-02-12 15:12:33 UTC

Description OSIDB Bzimport 2025-11-12 11:03:23 UTC
In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping

When an invalid value is passed via quirk option, currently
bytcr_rt5640 driver only shows an error message but leaves as is.
This may lead to unepxected results like OOB access.

This patch corrects the input mapping to the certain default value if
an invalid value is passed.

Comment 4 errata-xmlrpc 2026-01-19 13:14:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:0804 https://access.redhat.com/errata/RHSA-2026:0804

Comment 5 errata-xmlrpc 2026-01-21 09:39:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:0917 https://access.redhat.com/errata/RHSA-2026:0917

Comment 7 errata-xmlrpc 2026-01-26 07:44:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:1148 https://access.redhat.com/errata/RHSA-2026:1148

Comment 8 errata-xmlrpc 2026-01-26 13:31:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:1142 https://access.redhat.com/errata/RHSA-2026:1142

Comment 9 errata-xmlrpc 2026-01-26 16:23:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:1236 https://access.redhat.com/errata/RHSA-2026:1236

Comment 11 errata-xmlrpc 2026-01-28 00:23:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:1443 https://access.redhat.com/errata/RHSA-2026:1443

Comment 12 errata-xmlrpc 2026-01-28 00:29:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:1441 https://access.redhat.com/errata/RHSA-2026:1441

Comment 13 errata-xmlrpc 2026-01-28 15:04:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:1495 https://access.redhat.com/errata/RHSA-2026:1495

Comment 14 errata-xmlrpc 2026-01-28 15:08:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:1494 https://access.redhat.com/errata/RHSA-2026:1494

Comment 15 errata-xmlrpc 2026-02-02 00:46:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:1617 https://access.redhat.com/errata/RHSA-2026:1617

Comment 16 errata-xmlrpc 2026-02-02 09:50:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:1690 https://access.redhat.com/errata/RHSA-2026:1690

Comment 18 errata-xmlrpc 2026-02-04 09:03:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:1886 https://access.redhat.com/errata/RHSA-2026:1886

Comment 19 errata-xmlrpc 2026-02-11 00:16:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:2490 https://access.redhat.com/errata/RHSA-2026:2490

Comment 20 errata-xmlrpc 2026-02-11 11:50:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:2535 https://access.redhat.com/errata/RHSA-2026:2535

Comment 21 errata-xmlrpc 2026-02-12 15:12:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2026:2664 https://access.redhat.com/errata/RHSA-2026:2664


Note You need to log in before you can comment on or make changes to this bug.