-

CVE-2025-40121

In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping

When an invalid value is passed via quirk option, currently
bytcr_rt5640 driver just ignores and leaves as is, which may lead to
unepxected results like OOB access.

This patch adds the sanity check and corrects the input mapping to the
certain default value if an invalid value is passed.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < bff827b0d507e52b23efab9f67c232a4f037ab2c
Version 64484ccee7af53f08cca2ee3853cb8e18914d8b2
Status affected
Version < 64a36a7032082b4c330ce081acb6efb99246020e
Version 64484ccee7af53f08cca2ee3853cb8e18914d8b2
Status affected
Version < 95e29db33b5f73218ae08ebb48c61c9a8d28e2ff
Version 64484ccee7af53f08cca2ee3853cb8e18914d8b2
Status affected
Version < 2204e582b4eea872e1e7a5c90edcb84b928c68b0
Version 64484ccee7af53f08cca2ee3853cb8e18914d8b2
Status affected
Version < f197894de2f4ef46c7d53827d9df294b75c35e13
Version 64484ccee7af53f08cca2ee3853cb8e18914d8b2
Status affected
Version < fdf99978a6480e14405212472b6c747e0fa43bed
Version 64484ccee7af53f08cca2ee3853cb8e18914d8b2
Status affected
Version < c60f269c123210a6846d6d1367de0eaa402c10b0
Version 64484ccee7af53f08cca2ee3853cb8e18914d8b2
Status affected
Version < 4336efb59ef364e691ef829a73d9dbd4d5ed7c7b
Version 64484ccee7af53f08cca2ee3853cb8e18914d8b2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.18
Status affected
Version < 4.18
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.301
Status unaffected
Version <= 5.10.*
Version 5.10.246
Status unaffected
Version <= 5.15.*
Version 5.15.195
Status unaffected
Version <= 6.1.*
Version 6.1.156
Status unaffected
Version <= 6.6.*
Version 6.6.112
Status unaffected
Version <= 6.12.*
Version 6.12.53
Status unaffected
Version <= 6.17.*
Version 6.17.3
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.191
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String