VYPR
Unrated severityNVD Advisory· Published Dec 12, 2025· Updated Apr 15, 2026

CVE-2025-40345

CVE-2025-40345

Description

In the Linux kernel, the following vulnerability has been resolved:

usb: storage: sddr55: Reject out-of-bound new_pba

Discovered by Atuin - Automated Vulnerability Discovery Engine.

new_pba comes from the status packet returned after each write. A bogus device could report values beyond the block count derived from info->capacity, letting the driver walk off the end of pba_to_lba[] and corrupt heap memory.

Reject PBAs that exceed the computed block count and fail the transfer so we avoid touching out-of-range mapping entries.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's sddr55 usb-storage driver, a malicious device can supply an out-of-bounds new_pba value to corrupt heap memory via pba_to_lba[].

Root

Cause

The sddr55 USB storage driver in the Linux kernel lacked a bounds check on the new_pba value received from a storage device after a write operation. The driver derives the block count from info->capacity, and if new_pba exceeds that count, the driver writes past the end of the pba_to_lba[] array, corrupting heap memory [1][2][3][4].

Exploitation

An attacker with physical USB access or the ability to impersonate a storage device can send a crafted status packet containing an out-of-bounds new_pba value during a write transfer. No special privileges are required beyond the ability to connect a malicious device [1]. The vulnerability is reachable when the kernel's USB storage subsystem processes the write response.

Impact

Successful exploitation leads to heap memory corruption. This could potentially allow an attacker to crash the system or, under certain conditions, achieve arbitrary code execution within the kernel context [1]. The severity is reflected in the discovery being made via an automated vulnerability detection engine.

Mitigation

The fix has been included in the Linux kernel stable tree [1][2][3][4]. System administrators should update their kernel to a version containing the commit that rejects out-of-range new_pba values. No workaround is available other than applying the patch or disallowing use of the affected driver.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.