Description
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() In snd_usb_get_audioformat_uac3(), the length value returned from snd_usb_ctl_msg() is used directly for memory allocation without validation. This length is controlled by the USB device. The allocated buffer is cast to a uac3_cluster_header_descriptor and its fields are accessed without verifying that the buffer is large enough. If the device returns a smaller than expected length, this leads to an out-of-bounds read. Add a length check to ensure the buffer is large enough for uac3_cluster_header_descriptor.
References (10)
Core 10
Core References
Third Party Advisory, Mailing List
https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
Third Party Advisory, Mailing List
https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
Scores
CVSS v3
7.1
EPSS
0.0003
EPSS Percentile
7.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (10)
debian/debian_linux
11.0
linux/Kernel
4.17.0 - 5.4.296linux
linux/Kernel
5.11.0 - 5.15.187linux
linux/Kernel
5.16.0 - 6.1.143linux
linux/Kernel
5.5.0 - 5.10.240linux
linux/Kernel
6.13.0 - 6.15.5linux
linux/Kernel
6.2.0 - 6.6.96linux
linux/Kernel
6.7.0 - 6.12.36linux
linux/linux_kernel
6.16 rc1 (3 CPE variants)
linux/linux_kernel
4.17 - 5.4.296
Published
Jul 09, 2025
Tracked Since
Feb 18, 2026