In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()
In snd_usb_get_audioformat_uac3(), the length value returned from
snd_usb_ctl_msg() is used directly for memory allocation without
validation. This length is controlled by the USB device.
The allocated buffer is cast to a uac3_cluster_header_descriptor
and its fields are accessed without verifying that the buffer
is large enough. If the device returns a smaller than expected
length, this leads to an out-of-bounds read.
Add a length check to ensure the buffer is large enough for
uac3_cluster_header_descriptor.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
18 Dec 2025, 17:11
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/0ee87c2814deb5e42921281116ac3abcb326880b - Patch | |
| References | () https://git.kernel.org/stable/c/11e740dc1a2c8590eb7074b5c4ab921bb6224c36 - Patch | |
| References | () https://git.kernel.org/stable/c/24ff7d465c4284529bbfa207757bffb6f44b6403 - Patch | |
| References | () https://git.kernel.org/stable/c/2dc1c3edf67abd30c757f8054a5da61927cdda21 - Patch | |
| References | () https://git.kernel.org/stable/c/6eb211788e1370af52a245d4d7da35c374c7b401 - Patch | |
| References | () https://git.kernel.org/stable/c/74fcb3852a2f579151ce80b9ed96cd916ba0d5d8 - Patch | |
| References | () https://git.kernel.org/stable/c/c3fb926abe90d86f5e3055e0035f04d9892a118b - Patch | |
| References | () https://git.kernel.org/stable/c/fb4e2a6e8f28a3c0ad382e363aeb9cd822007b8a - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-125 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
17 Jul 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
10 Jul 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
10 Jul 2025, 13:17
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
09 Jul 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-09 11:15
Updated : 2025-12-18 17:11
NVD link : CVE-2025-38249
Mitre link : CVE-2025-38249
CVE.ORG link : CVE-2025-38249
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
