VYPR
Unrated severityNVD Advisory· Published Dec 6, 2025· Updated Apr 15, 2026

CVE-2025-40269

CVE-2025-40269

Description

In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential overflow of PCM transfer buffer

The PCM stream data in USB-audio driver is transferred over USB URB packet buffers, and each packet size is determined dynamically. The packet sizes are limited by some factors such as wMaxPacketSize USB descriptor. OTOH, in the current code, the actually used packet sizes are determined only by the rate and the PPS, which may be bigger than the size limit above. This results in a buffer overflow, as reported by syzbot.

Basically when the limit is smaller than the calculated packet size, it implies that something is wrong, most likely a weird USB descriptor. So the best option would be just to return an error at the parameter setup time before doing any further operations.

This patch introduces such a sanity check, and returns -EINVAL when the packet size is greater than maxpacksize. The comparison with ep->packsize[1] alone should suffice since it's always equal or greater than ep->packsize[0].

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A buffer overflow in the Linux kernel's ALSA USB-audio driver occurs when dynamically calculated PCM packet sizes exceed the USB wMaxPacketSize limit, fixed by adding a sanity check.

Vulnerability

Overview

The Linux kernel's ALSA USB-audio driver contains a buffer overflow vulnerability in the PCM stream data transfer path. The driver dynamically determines USB URB packet sizes based on the audio rate and packets per second (PPS), but fails to verify that the calculated size does not exceed the USB endpoint's wMaxPacketSize limit. When a device reports a wMaxPacketSize smaller than the computed packet size—often due to a malformed USB descriptor—the driver writes beyond the allocated buffer, causing a memory corruption [1].

Exploitation

Prerequisites

An attacker would need to connect a malicious USB audio device to the target system, or the system must be configured to accept such devices. No special privileges are required beyond physical or logical access to a USB port. The vulnerability is triggered during PCM stream setup, before any audio data is transferred, meaning the attack surface is limited to the enumeration and configuration phase of a USB audio device.

Impact

Successful exploitation could lead to a buffer overflow in kernel memory, potentially resulting in a denial of service (system crash) or, in more severe scenarios, arbitrary code execution in the kernel context. The issue was reported by syzbot, indicating it is reachable from user space via USB device interaction.

Mitigation

The fix introduces a sanity check at parameter setup time: if the calculated packet size exceeds the endpoint's maxpacksize (specifically ep->packsize[1]), the driver returns -EINVAL and aborts the stream configuration. This prevents the overflow from occurring. The patch has been applied to the stable kernel tree [1]. Users should update to a kernel version containing this commit.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

13

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

13

News mentions

0

No linked articles in our index yet.