CVE-2025-39757

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

09 Jan 2026, 18:48

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-125
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
References () https://git.kernel.org/stable/c/1034719fdefd26caeec0a44a868bb5a412c2c1a5 - () https://git.kernel.org/stable/c/1034719fdefd26caeec0a44a868bb5a412c2c1a5 - Patch
References () https://git.kernel.org/stable/c/275e37532e8ebe25e8a4069b2d9f955bfd202a46 - () https://git.kernel.org/stable/c/275e37532e8ebe25e8a4069b2d9f955bfd202a46 - Patch
References () https://git.kernel.org/stable/c/47ab3d820cb0a502bd0074f83bb3cf7ab5d79902 - () https://git.kernel.org/stable/c/47ab3d820cb0a502bd0074f83bb3cf7ab5d79902 - Patch
References () https://git.kernel.org/stable/c/786571b10b1ae6d90e1242848ce78ee7e1d493c4 - () https://git.kernel.org/stable/c/786571b10b1ae6d90e1242848ce78ee7e1d493c4 - Patch
References () https://git.kernel.org/stable/c/799c06ad4c9c790c265e8b6b94947213f1fb389c - () https://git.kernel.org/stable/c/799c06ad4c9c790c265e8b6b94947213f1fb389c - Patch
References () https://git.kernel.org/stable/c/7ef3fd250f84494fb2f7871f357808edaa1fc6ce - () https://git.kernel.org/stable/c/7ef3fd250f84494fb2f7871f357808edaa1fc6ce - Patch
References () https://git.kernel.org/stable/c/ae17b3b5e753efc239421d186cd1ff06e5ac296e - () https://git.kernel.org/stable/c/ae17b3b5e753efc239421d186cd1ff06e5ac296e - Patch
References () https://git.kernel.org/stable/c/dfdcbcde5c20df878178245d4449feada7d5b201 - () https://git.kernel.org/stable/c/dfdcbcde5c20df878178245d4449feada7d5b201 - Patch
References () https://git.kernel.org/stable/c/ecfd41166b72b67d3bdeb88d224ff445f6163869 - () https://git.kernel.org/stable/c/ecfd41166b72b67d3bdeb88d224ff445f6163869 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

11 Sep 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-11 17:15

Updated : 2026-01-09 18:48


NVD link : CVE-2025-39757

Mitre link : CVE-2025-39757

CVE.ORG link : CVE-2025-39757


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read