CVE-2025-38249

HIGH

Linux Kernel - Memory Corruption

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() In snd_usb_get_audioformat_uac3(), the length value returned from snd_usb_ctl_msg() is used directly for memory allocation without validation. This length is controlled by the USB device. The allocated buffer is cast to a uac3_cluster_header_descriptor and its fields are accessed without verifying that the buffer is large enough. If the device returns a smaller than expected length, this leads to an out-of-bounds read. Add a length check to ensure the buffer is large enough for uac3_cluster_header_descriptor.

Scores

CVSS v3 7.1
EPSS 0.0003
EPSS Percentile 7.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Details

CWE
CWE-125
Status published
Products (10)
debian/debian_linux 11.0
linux/Kernel 4.17.0 - 5.4.296linux
linux/Kernel 5.11.0 - 5.15.187linux
linux/Kernel 5.16.0 - 6.1.143linux
linux/Kernel 5.5.0 - 5.10.240linux
linux/Kernel 6.13.0 - 6.15.5linux
linux/Kernel 6.2.0 - 6.6.96linux
linux/Kernel 6.7.0 - 6.12.36linux
linux/linux_kernel 6.16 rc1 (3 CPE variants)
linux/linux_kernel 4.17 - 5.4.296
Published Jul 09, 2025
Tracked Since Feb 18, 2026