We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() In snd_usb_get_audioformat_uac3(), the length value returned from snd_usb_ctl_msg() is used directly for memory allocation without validation. This length is controlled by the USB device. The allocated buffer is cast to a uac3_cluster_header_descriptor and its fields are accessed without verifying that the buffer is large enough. If the device returns a smaller than expected length, this leads to an out-of-bounds read. Add a length check to ensure the buffer is large enough for uac3_cluster_header_descriptor.
Reserved 2025-04-16 | Published 2025-07-09 | Updated 2025-07-10 | Assigner Linuxgit.kernel.org/...c/c3fb926abe90d86f5e3055e0035f04d9892a118b
git.kernel.org/...c/6eb211788e1370af52a245d4d7da35c374c7b401
git.kernel.org/...c/74fcb3852a2f579151ce80b9ed96cd916ba0d5d8
git.kernel.org/...c/0ee87c2814deb5e42921281116ac3abcb326880b
git.kernel.org/...c/11e740dc1a2c8590eb7074b5c4ab921bb6224c36
git.kernel.org/...c/fb4e2a6e8f28a3c0ad382e363aeb9cd822007b8a
Support options