CVE-2025-40121
Description
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
When an invalid value is passed via quirk option, currently bytcr_rt5640 driver just ignores and leaves as is, which may lead to unepxected results like OOB access.
This patch adds the sanity check and corrects the input mapping to the certain default value if an invalid value is passed.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing input validation in the Linux kernel's ASoC bytcr_rt5651 driver allows an invalid quirk value to cause out-of-bounds access; the fix adds a sanity check and defaults.
Vulnerability
Analysis
CVE-2025-40121 is a vulnerability in the Linux kernel's ASoC (ALSA System on Chip) Intel Bay Trail/Cherry Trail RT5651 audio machine driver (bytcr_rt5651). The root cause is the absence of input validation when processing the quirk module parameter. Passing an invalid value through this option could lead to unexpected behavior, including out-of-bounds (OOB) memory access, as the driver previously accepted the value without any sanity check [1][2][3][4].
Exploitation
To exploit this issue, an attacker must have the ability to modify kernel module parameters, typically requiring local access or the ability to influence boot parameters via platforms where the driver is loaded with a crafted quirk value. No authentication is needed from the attacker's perspective if they possess sufficient privileges to set the parameter, but exploitation is local in nature, not remotely accessible over a network [1][2][3][4].
Impact
A successful exploitation could result in out-of-bounds memory access, potentially leading to system instability, information disclosure, or code execution, depending on the specific invalid value used. The vulnerability primarily affects systems using Intel Bay Trail or Cherry Trail SoCs with a Realtek RT5651 audio codec [1][2][3][4].
Mitigation
The vulnerability has been patched in the Linux kernel by committing a sanity check that corrects an invalid input mapping to a safe default value [1][2][3][4]. Users should update to a kernel version containing the fix (commits referenced) to eliminate the risk.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
82204e582b4eef197894de2f4fdf99978a648c60f269c12324336efb59ef3bff827b0d50764a36a70320895e29db33b5fVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/2204e582b4eea872e1e7a5c90edcb84b928c68b0nvd
- git.kernel.org/stable/c/4336efb59ef364e691ef829a73d9dbd4d5ed7c7bnvd
- git.kernel.org/stable/c/64a36a7032082b4c330ce081acb6efb99246020envd
- git.kernel.org/stable/c/95e29db33b5f73218ae08ebb48c61c9a8d28e2ffnvd
- git.kernel.org/stable/c/bff827b0d507e52b23efab9f67c232a4f037ab2cnvd
- git.kernel.org/stable/c/c60f269c123210a6846d6d1367de0eaa402c10b0nvd
- git.kernel.org/stable/c/f197894de2f4ef46c7d53827d9df294b75c35e13nvd
- git.kernel.org/stable/c/fdf99978a6480e14405212472b6c747e0fa43bednvd
News mentions
0No linked articles in our index yet.