CVE-2025-38249
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
09/07/2025
Last modified:
18/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()<br />
<br />
In snd_usb_get_audioformat_uac3(), the length value returned from<br />
snd_usb_ctl_msg() is used directly for memory allocation without<br />
validation. This length is controlled by the USB device.<br />
<br />
The allocated buffer is cast to a uac3_cluster_header_descriptor<br />
and its fields are accessed without verifying that the buffer<br />
is large enough. If the device returns a smaller than expected<br />
length, this leads to an out-of-bounds read.<br />
<br />
Add a length check to ensure the buffer is large enough for<br />
uac3_cluster_header_descriptor.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.17 (including) | 5.4.296 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.187 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.143 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.96 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.36 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0ee87c2814deb5e42921281116ac3abcb326880b
- https://git.kernel.org/stable/c/11e740dc1a2c8590eb7074b5c4ab921bb6224c36
- https://git.kernel.org/stable/c/24ff7d465c4284529bbfa207757bffb6f44b6403
- https://git.kernel.org/stable/c/2dc1c3edf67abd30c757f8054a5da61927cdda21
- https://git.kernel.org/stable/c/6eb211788e1370af52a245d4d7da35c374c7b401
- https://git.kernel.org/stable/c/74fcb3852a2f579151ce80b9ed96cd916ba0d5d8
- https://git.kernel.org/stable/c/c3fb926abe90d86f5e3055e0035f04d9892a118b
- https://git.kernel.org/stable/c/fb4e2a6e8f28a3c0ad382e363aeb9cd822007b8a
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



