CVE-2025-40345
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: storage: sddr55: Reject out-of-bound new_pba
Discovered by Atuin - Automated Vulnerability Discovery Engine.
new_pba comes from the status packet returned after each write. A bogus device could report values beyond the block count derived from info->capacity, letting the driver walk off the end of pba_to_lba[] and corrupt heap memory.
Reject PBAs that exceed the computed block count and fail the transfer so we avoid touching out-of-range mapping entries.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's sddr55 usb-storage driver, a malicious device can supply an out-of-bounds new_pba value to corrupt heap memory via pba_to_lba[].
Root
Cause
The sddr55 USB storage driver in the Linux kernel lacked a bounds check on the new_pba value received from a storage device after a write operation. The driver derives the block count from info->capacity, and if new_pba exceeds that count, the driver writes past the end of the pba_to_lba[] array, corrupting heap memory [1][2][3][4].
Exploitation
An attacker with physical USB access or the ability to impersonate a storage device can send a crafted status packet containing an out-of-bounds new_pba value during a write transfer. No special privileges are required beyond the ability to connect a malicious device [1]. The vulnerability is reachable when the kernel's USB storage subsystem processes the write response.
Impact
Successful exploitation leads to heap memory corruption. This could potentially allow an attacker to crash the system or, under certain conditions, achieve arbitrary code execution within the kernel context [1]. The severity is reflected in the discovery being made via an automated vulnerability detection engine.
Mitigation
The fix has been included in the Linux kernel stable tree [1][2][3][4]. System administrators should update their kernel to a version containing the commit that rejects out-of-range new_pba values. No workaround is available other than applying the patch or disallowing use of the affected driver.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
7d00a6c04a50226e9b5da3231aa64e0e17e3a04a8a6393f3fa20f1dd19d215ebe8d479aafb59d4fda7e7dVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/04a8a6393f3f2f471e05eacca33282dd30b01432nvd
- git.kernel.org/stable/c/26e9b5da3231da7dc357b363883b5b7b51a64092nvd
- git.kernel.org/stable/c/5ebe8d479aaf4f41ac35e6955332304193c646f6nvd
- git.kernel.org/stable/c/a20f1dd19d21dcb70140ea5a71b1f8cbe0c7e68fnvd
- git.kernel.org/stable/c/aa64e0e17e3a5991a25e6a46007770c629039869nvd
- git.kernel.org/stable/c/b59d4fda7e7d0aff1043a7f742487cb829f5aac1nvd
- git.kernel.org/stable/c/d00a6c04a502cd52425dbf35588732c652b16490nvd
News mentions
0No linked articles in our index yet.