Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-38249
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-09 Jul, 2025 | 10:42
Updated At-03 Nov, 2025 | 17:35
Rejected At-
▼CVE Numbering Authority (CNA)
ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() In snd_usb_get_audioformat_uac3(), the length value returned from snd_usb_ctl_msg() is used directly for memory allocation without validation. This length is controlled by the USB device. The allocated buffer is cast to a uac3_cluster_header_descriptor and its fields are accessed without verifying that the buffer is large enough. If the device returns a smaller than expected length, this leads to an out-of-bounds read. Add a length check to ensure the buffer is large enough for uac3_cluster_header_descriptor.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • sound/usb/stream.c
Default Status
unaffected
Versions
Affected
  • From 9a2fe9b801f585baccf8352d82839dcd54b300cf before 24ff7d465c4284529bbfa207757bffb6f44b6403 (git)
  • From 9a2fe9b801f585baccf8352d82839dcd54b300cf before 2dc1c3edf67abd30c757f8054a5da61927cdda21 (git)
  • From 9a2fe9b801f585baccf8352d82839dcd54b300cf before c3fb926abe90d86f5e3055e0035f04d9892a118b (git)
  • From 9a2fe9b801f585baccf8352d82839dcd54b300cf before 6eb211788e1370af52a245d4d7da35c374c7b401 (git)
  • From 9a2fe9b801f585baccf8352d82839dcd54b300cf before 74fcb3852a2f579151ce80b9ed96cd916ba0d5d8 (git)
  • From 9a2fe9b801f585baccf8352d82839dcd54b300cf before 0ee87c2814deb5e42921281116ac3abcb326880b (git)
  • From 9a2fe9b801f585baccf8352d82839dcd54b300cf before 11e740dc1a2c8590eb7074b5c4ab921bb6224c36 (git)
  • From 9a2fe9b801f585baccf8352d82839dcd54b300cf before fb4e2a6e8f28a3c0ad382e363aeb9cd822007b8a (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • sound/usb/stream.c
Default Status
affected
Versions
Affected
  • 4.17
Unaffected
  • From 0 before 4.17 (semver)
  • From 5.4.296 through 5.4.* (semver)
  • From 5.10.240 through 5.10.* (semver)
  • From 5.15.187 through 5.15.* (semver)
  • From 6.1.143 through 6.1.* (semver)
  • From 6.6.96 through 6.6.* (semver)
  • From 6.12.36 through 6.12.* (semver)
  • From 6.15.5 through 6.15.* (semver)
  • From 6.16 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/24ff7d465c4284529bbfa207757bffb6f44b6403
N/A
https://git.kernel.org/stable/c/2dc1c3edf67abd30c757f8054a5da61927cdda21
N/A
https://git.kernel.org/stable/c/c3fb926abe90d86f5e3055e0035f04d9892a118b
N/A
https://git.kernel.org/stable/c/6eb211788e1370af52a245d4d7da35c374c7b401
N/A
https://git.kernel.org/stable/c/74fcb3852a2f579151ce80b9ed96cd916ba0d5d8
N/A
https://git.kernel.org/stable/c/0ee87c2814deb5e42921281116ac3abcb326880b
N/A
https://git.kernel.org/stable/c/11e740dc1a2c8590eb7074b5c4ab921bb6224c36
N/A
https://git.kernel.org/stable/c/fb4e2a6e8f28a3c0ad382e363aeb9cd822007b8a
N/A
Hyperlink: https://git.kernel.org/stable/c/24ff7d465c4284529bbfa207757bffb6f44b6403
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2dc1c3edf67abd30c757f8054a5da61927cdda21
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c3fb926abe90d86f5e3055e0035f04d9892a118b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6eb211788e1370af52a245d4d7da35c374c7b401
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/74fcb3852a2f579151ce80b9ed96cd916ba0d5d8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0ee87c2814deb5e42921281116ac3abcb326880b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/11e740dc1a2c8590eb7074b5c4ab921bb6224c36
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/fb4e2a6e8f28a3c0ad382e363aeb9cd822007b8a
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
N/A
https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
Resource: N/A
Details not found