CVE-2025-38249
09.07.2025, 11:15
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() In snd_usb_get_audioformat_uac3(), the length value returned from snd_usb_ctl_msg() is used directly for memory allocation without validation. This length is controlled by the USB device. The allocated buffer is cast to a uac3_cluster_header_descriptor and its fields are accessed without verifying that the buffer is large enough. If the device returns a smaller than expected length, this leads to an out-of-bounds read. Add a length check to ensure the buffer is large enough for uac3_cluster_header_descriptor.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.17 ≤ 𝑥 < 5.4.296 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.240 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.187 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.143 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.96 |
| linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.36 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.15.5 |
| linux | linux_kernel | 6.16:rc1 |
| linux | linux_kernel | 6.16:rc2 |
| linux | linux_kernel | 6.16:rc3 |
| debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References