๐Ÿ” CVE Alert

CVE-2025-21704

UNKNOWN 0.0

usb: cdc-acm: Check control transfer buffer size before access

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: cdc-acm: Check control transfer buffer size before access If the first fragment is shorter than struct usb_cdc_notification, we can't calculate an expected_size. Log an error and discard the notification instead of reading lengths from memory outside the received data, which can lead to memory corruption when the expected_size decreases between fragments, causing `expected_size - acm->nb_index` to wrap. This issue has been present since the beginning of git history; however, it only leads to memory corruption since commit ea2583529cd1 ("cdc-acm: reassemble fragmented notifications"). A mitigating factor is that acm_ctrl_irq() can only execute after userspace has opened /dev/ttyACM*; but if ModemManager is running, ModemManager will do that automatically depending on the USB device's vendor/product IDs and its other interfaces.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 22, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a4e1ae5c0533964170197e4fb4f33bc8c1db5cd2 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 90dd2f1b7342b9a671a5ea4160f408037b92b118 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 871619c2b78fdfe05afb4e8ba548678687beb812 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 7828e9363ac4d23b02419bf2a45b9f1d9fb35646 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 6abb510251e75f875797d8983a830e6731fa281c 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f64079bef6a8a7823358c3f352ea29a617844636 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 383d516a0ebc8641372b521c8cb717f0f1834831 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e563b01208f4d1f609bcab13333b6c0e24ce6a01
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a4e1ae5c0533964170197e4fb4f33bc8c1db5cd2 git.kernel.org: https://git.kernel.org/stable/c/90dd2f1b7342b9a671a5ea4160f408037b92b118 git.kernel.org: https://git.kernel.org/stable/c/871619c2b78fdfe05afb4e8ba548678687beb812 git.kernel.org: https://git.kernel.org/stable/c/7828e9363ac4d23b02419bf2a45b9f1d9fb35646 git.kernel.org: https://git.kernel.org/stable/c/6abb510251e75f875797d8983a830e6731fa281c git.kernel.org: https://git.kernel.org/stable/c/f64079bef6a8a7823358c3f352ea29a617844636 git.kernel.org: https://git.kernel.org/stable/c/383d516a0ebc8641372b521c8cb717f0f1834831 git.kernel.org: https://git.kernel.org/stable/c/e563b01208f4d1f609bcab13333b6c0e24ce6a01 project-zero.issues.chromium.org: https://project-zero.issues.chromium.org/issues/395107243 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html