VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40154

CVE-2025-40154

Description

In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping

When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access.

This patch corrects the input mapping to the certain default value if an invalid value is passed.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Invalid quirk input in the Linux kernel's bytcr_rt5640 driver can cause OOB access, fixed by mapping invalid values to a safe default.

CVE-2025-40154 is a vulnerability in the Linux kernel's ASoC Intel bytcr_rt5640 driver. The driver accepts a quirk option, but when an invalid value is provided, it only logs an error message without correcting the input. This leaves internal data structures in an inconsistent state, potentially leading to out-of-bounds (OOB) memory access [1][2][3].

The attack surface is local; an attacker with the ability to pass a malformed quirk value to the driver (e.g., through a module parameter or device configuration) can trigger the flaw. No authentication is required beyond the ability to load the driver or modify its parameters, which on many systems is accessible to users with limited privileges. The lack of input validation means the driver does not reject or sanitize invalid values [1][2][3].

An attacker exploiting this could cause an OOB read or write, which may result in system instability, information disclosure, or privilege escalation. The impact is similar to other memory safety bugs in the kernel. The official fix, committed to multiple stable kernel branches, corrects the input mapping by setting invalid values to a certain default, preventing the out-of-bounds condition [1][2][3].

Patches are available in the upstream Linux kernel and recommended for inclusion in all affected distributions. Users should update their kernels to incorporate the fix, which resolves the vulnerability by ensuring that invalid quirk input is safely defaulted rather than left unchecked.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

3

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.