-

CVE-2025-40269

In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential overflow of PCM transfer buffer

The PCM stream data in USB-audio driver is transferred over USB URB
packet buffers, and each packet size is determined dynamically.  The
packet sizes are limited by some factors such as wMaxPacketSize USB
descriptor.  OTOH, in the current code, the actually used packet sizes
are determined only by the rate and the PPS, which may be bigger than
the size limit above.  This results in a buffer overflow, as reported
by syzbot.

Basically when the limit is smaller than the calculated packet size,
it implies that something is wrong, most likely a weird USB
descriptor.  So the best option would be just to return an error at
the parameter setup time before doing any further operations.

This patch introduces such a sanity check, and returns -EINVAL when
the packet size is greater than maxpacksize.  The comparison with
ep->packsize[1] alone should suffice since it's always equal or
greater than ep->packsize[0].
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 480a1490c595a242f27493a4544b3efb21b29f6a
Version 02c56650f3c118d3752122996d96173d26bb13aa
Status affected
Version < ab0b5e92fc36ee82c1bd01fe896d0f775ed5de41
Version 5ef30e443e6d3654cccecec99cf481a69a0a6d3b
Status affected
Version < 282aba56713bbc58155716b55ca7222b2d9cf3c8
Version 99703c921864a318e3e8aae74fde071b1ff35bea
Status affected
Version < c4dc012b027c9eb101583011089dea14d744e314
Version 2d50acd7dbd0682a56968ad9551341d7fc5b6eaf
Status affected
Version < e0ed5a36fb3ab9e7b9ee45cd17f09f6d5f594360
Version aba41867dd66939d336fdf604e4d73b805d8039f
Status affected
Version < d67dde02049e632ba58d3c44a164a74b6a737154
Version d288dc74f8cf95cb7ae0aaf245b7128627a49bf3
Status affected
Version < 6a5da3fa80affc948923f20a4e086177f505e86e
Version f0bd62b64016508938df9babe47f65c2c727d25c
Status affected
Version < 217d47255a2ec8b246f2725f5db9ac3f1d4109d7
Version f0bd62b64016508938df9babe47f65c2c727d25c
Status affected
Version < ef592bf2232a2daa9fffa8881881fc9957ea56e9
Version f0bd62b64016508938df9babe47f65c2c727d25c
Status affected
Version < ece3b981bb6620e47fac826a2156c090b1a936a0
Version f0bd62b64016508938df9babe47f65c2c727d25c
Status affected
Version < 98e9d5e33bda8db875cc1a4fe99c192658e45ab6
Version f0bd62b64016508938df9babe47f65c2c727d25c
Status affected
Version < d2c04f20ccc6c0d219e6d3038bab45bc66a178ad
Version f0bd62b64016508938df9babe47f65c2c727d25c
Status affected
Version < 05a1fc5efdd8560f34a3af39c9cf1e1526cc3ddf
Version f0bd62b64016508938df9babe47f65c2c727d25c
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.8
Status affected
Version < 5.8
Version 0
Status unaffected
Version <= 4.4.*
Version 4.4.230
Status unaffected
Version <= 4.9.*
Version 4.9.230
Status unaffected
Version <= 4.14.*
Version 4.14.188
Status unaffected
Version <= 4.19.*
Version 4.19.132
Status unaffected
Version <= 5.4.*
Version 5.4.51
Status unaffected
Version <= 5.7.*
Version 5.7.8
Status unaffected
Version <= 5.10.*
Version 5.10.247
Status unaffected
Version <= 5.15.*
Version 5.15.197
Status unaffected
Version <= 6.1.*
Version 6.1.159
Status unaffected
Version <= 6.6.*
Version 6.6.117
Status unaffected
Version <= 6.12.*
Version 6.12.59
Status unaffected
Version <= 6.17.*
Version 6.17.9
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.15% 0.362
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.