We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-37891

ALSA: ump: Fix buffer overflow at UMP SysEx message conversion



Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: ump: Fix buffer overflow at UMP SysEx message conversion The conversion function from MIDI 1.0 to UMP packet contains an internal buffer to keep the incoming MIDI bytes, and its size is 4, as it was supposed to be the max size for a MIDI1 UMP packet data. However, the implementation overlooked that SysEx is handled in a different format, and it can be up to 6 bytes, as found in do_convert_to_ump(). It leads eventually to a buffer overflow, and may corrupt the memory when a longer SysEx message is received. The fix is simply to extend the buffer size to 6 to fit with the SysEx UMP message.

Reserved 2025-04-16 | Published 2025-05-19 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

0b5288f5fe63eab687c14e5940b9e0d532b129f2 before ce4f77bef276e7d2eb7ab03a5d08bcbaa40710ec
affected

0b5288f5fe63eab687c14e5940b9e0d532b129f2 before 226beac5605afbb33f8782148d188b64396145a4
affected

0b5288f5fe63eab687c14e5940b9e0d532b129f2 before 42ef48dd4ebb082a1a90b5c3feeda2e68a9e32fe
affected

0b5288f5fe63eab687c14e5940b9e0d532b129f2 before 56f1f30e6795b890463d9b20b11e576adf5a2f77
affected

Default status
affected

6.5
affected

Any version before 6.5
unaffected

6.6.90
unaffected

6.12.28
unaffected

6.14.6
unaffected

6.15
unaffected

References

git.kernel.org/...c/ce4f77bef276e7d2eb7ab03a5d08bcbaa40710ec

git.kernel.org/...c/226beac5605afbb33f8782148d188b64396145a4

git.kernel.org/...c/42ef48dd4ebb082a1a90b5c3feeda2e68a9e32fe

git.kernel.org/...c/56f1f30e6795b890463d9b20b11e576adf5a2f77

cve.org (CVE-2025-37891)

nvd.nist.gov (CVE-2025-37891)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-37891

Support options

Helpdesk Chat, Email, Knowledgebase