CVE-2025-40269
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/12/2025
Last modified:
06/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ALSA: usb-audio: Fix potential overflow of PCM transfer buffer<br />
<br />
The PCM stream data in USB-audio driver is transferred over USB URB<br />
packet buffers, and each packet size is determined dynamically. The<br />
packet sizes are limited by some factors such as wMaxPacketSize USB<br />
descriptor. OTOH, in the current code, the actually used packet sizes<br />
are determined only by the rate and the PPS, which may be bigger than<br />
the size limit above. This results in a buffer overflow, as reported<br />
by syzbot.<br />
<br />
Basically when the limit is smaller than the calculated packet size,<br />
it implies that something is wrong, most likely a weird USB<br />
descriptor. So the best option would be just to return an error at<br />
the parameter setup time before doing any further operations.<br />
<br />
This patch introduces such a sanity check, and returns -EINVAL when<br />
the packet size is greater than maxpacksize. The comparison with<br />
ep->packsize[1] alone should suffice since it&#39;s always equal or<br />
greater than ep->packsize[0].
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/05a1fc5efdd8560f34a3af39c9cf1e1526cc3ddf
- https://git.kernel.org/stable/c/217d47255a2ec8b246f2725f5db9ac3f1d4109d7
- https://git.kernel.org/stable/c/6a5da3fa80affc948923f20a4e086177f505e86e
- https://git.kernel.org/stable/c/98e9d5e33bda8db875cc1a4fe99c192658e45ab6
- https://git.kernel.org/stable/c/d2c04f20ccc6c0d219e6d3038bab45bc66a178ad
- https://git.kernel.org/stable/c/ece3b981bb6620e47fac826a2156c090b1a936a0
- https://git.kernel.org/stable/c/ef592bf2232a2daa9fffa8881881fc9957ea56e9



