VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40121

CVE-2025-40121

Description

In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping

When an invalid value is passed via quirk option, currently bytcr_rt5640 driver just ignores and leaves as is, which may lead to unepxected results like OOB access.

This patch adds the sanity check and corrects the input mapping to the certain default value if an invalid value is passed.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing input validation in the Linux kernel's ASoC bytcr_rt5651 driver allows an invalid quirk value to cause out-of-bounds access; the fix adds a sanity check and defaults.

Vulnerability

Analysis

CVE-2025-40121 is a vulnerability in the Linux kernel's ASoC (ALSA System on Chip) Intel Bay Trail/Cherry Trail RT5651 audio machine driver (bytcr_rt5651). The root cause is the absence of input validation when processing the quirk module parameter. Passing an invalid value through this option could lead to unexpected behavior, including out-of-bounds (OOB) memory access, as the driver previously accepted the value without any sanity check [1][2][3][4].

Exploitation

To exploit this issue, an attacker must have the ability to modify kernel module parameters, typically requiring local access or the ability to influence boot parameters via platforms where the driver is loaded with a crafted quirk value. No authentication is needed from the attacker's perspective if they possess sufficient privileges to set the parameter, but exploitation is local in nature, not remotely accessible over a network [1][2][3][4].

Impact

A successful exploitation could result in out-of-bounds memory access, potentially leading to system instability, information disclosure, or code execution, depending on the specific invalid value used. The vulnerability primarily affects systems using Intel Bay Trail or Cherry Trail SoCs with a Realtek RT5651 audio codec [1][2][3][4].

Mitigation

The vulnerability has been patched in the Linux kernel by committing a sanity check that corrects an invalid input mapping to a safe default value [1][2][3][4]. Users should update to a kernel version containing the fix (commits referenced) to eliminate the risk.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.