๐Ÿ” CVE Alert

CVE-2025-38249

UNKNOWN 0.0

ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() In snd_usb_get_audioformat_uac3(), the length value returned from snd_usb_ctl_msg() is used directly for memory allocation without validation. This length is controlled by the USB device. The allocated buffer is cast to a uac3_cluster_header_descriptor and its fields are accessed without verifying that the buffer is large enough. If the device returns a smaller than expected length, this leads to an out-of-bounds read. Add a length check to ensure the buffer is large enough for uac3_cluster_header_descriptor.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 9, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
9a2fe9b801f585baccf8352d82839dcd54b300cf < 24ff7d465c4284529bbfa207757bffb6f44b6403 9a2fe9b801f585baccf8352d82839dcd54b300cf < 2dc1c3edf67abd30c757f8054a5da61927cdda21 9a2fe9b801f585baccf8352d82839dcd54b300cf < c3fb926abe90d86f5e3055e0035f04d9892a118b 9a2fe9b801f585baccf8352d82839dcd54b300cf < 6eb211788e1370af52a245d4d7da35c374c7b401 9a2fe9b801f585baccf8352d82839dcd54b300cf < 74fcb3852a2f579151ce80b9ed96cd916ba0d5d8 9a2fe9b801f585baccf8352d82839dcd54b300cf < 0ee87c2814deb5e42921281116ac3abcb326880b 9a2fe9b801f585baccf8352d82839dcd54b300cf < 11e740dc1a2c8590eb7074b5c4ab921bb6224c36 9a2fe9b801f585baccf8352d82839dcd54b300cf < fb4e2a6e8f28a3c0ad382e363aeb9cd822007b8a
Linux / Linux
4.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/24ff7d465c4284529bbfa207757bffb6f44b6403 git.kernel.org: https://git.kernel.org/stable/c/2dc1c3edf67abd30c757f8054a5da61927cdda21 git.kernel.org: https://git.kernel.org/stable/c/c3fb926abe90d86f5e3055e0035f04d9892a118b git.kernel.org: https://git.kernel.org/stable/c/6eb211788e1370af52a245d4d7da35c374c7b401 git.kernel.org: https://git.kernel.org/stable/c/74fcb3852a2f579151ce80b9ed96cd916ba0d5d8 git.kernel.org: https://git.kernel.org/stable/c/0ee87c2814deb5e42921281116ac3abcb326880b git.kernel.org: https://git.kernel.org/stable/c/11e740dc1a2c8590eb7074b5c4ab921bb6224c36 git.kernel.org: https://git.kernel.org/stable/c/fb4e2a6e8f28a3c0ad382e363aeb9cd822007b8a lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html