CVE-2025-21704
22.02.2025, 10:15
In the Linux kernel, the following vulnerability has been resolved:
usb: cdc-acm: Check control transfer buffer size before access
If the first fragment is shorter than struct usb_cdc_notification, we can't
calculate an expected_size. Log an error and discard the notification
instead of reading lengths from memory outside the received data, which can
lead to memory corruption when the expected_size decreases between
fragments, causing `expected_size - acm->nb_index` to wrap.
This issue has been present since the beginning of git history; however,
it only leads to memory corruption since commit ea2583529cd1
("cdc-acm: reassemble fragmented notifications").
A mitigating factor is that acm_ctrl_irq() can only execute after userspace
has opened /dev/ttyACM*; but if ModemManager is running, ModemManager will
do that automatically depending on the USB device's vendor/product IDs and
its other interfaces.Enginsight| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 2.6.13 ≤ 𝑥 < 5.4.291 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.235 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.179 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.129 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.79 |
| linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.16 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.13.4 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12:rc2 |
| linux | linux_kernel | 2.6.12:rc3 |
| linux | linux_kernel | 2.6.12:rc4 |
| linux | linux_kernel | 2.6.12:rc5 |
| linux | linux_kernel | 6.14:rc1 |
| linux | linux_kernel | 6.14:rc2 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References