VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2025-68344

CVE-2025-68344

Description

In the Linux kernel, the following vulnerability has been resolved:

ALSA: wavefront: Fix integer overflow in sample size validation

The wavefront_send_sample() function has an integer overflow issue when validating sample size. The header->size field is u32 but gets cast to int for comparison with dev->freemem

Fix by using unsigned comparison to avoid integer overflow.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Integer overflow in wavefront_send_sample() in Linux kernel's ALSA driver allows bypassing sample size validation, potentially leading to buffer overflow.

Vulnerability

Description

In the Linux kernel's ALSA wavefront driver, the wavefront_send_sample() function contains an integer overflow vulnerability when validating sample size. The header->size field is of type u32 but is cast to int for comparison with dev->freemem. This type conversion can lead to an integer overflow, causing the validation to be bypassed.

Exploitation

An attacker with local access to the system can exploit this vulnerability by providing a crafted sample header with a large size value. When the value is cast to int, it may become negative or overflow, allowing the size check to be circumvented. The attacker would need to be able to send audio samples to the wavefront synthesizer device, which typically requires access to the ALSA device node.

Impact

Successful exploitation could allow an attacker to bypass the memory allocation size check, potentially leading to out-of-bounds writes or reads. This could corrupt kernel memory and potentially lead to privilege escalation or denial of service.

Mitigation

The vulnerability has been patched in the Linux kernel stable releases as of December 24, 2025 [1][2][3]. Users are advised to apply the latest kernel updates to mitigate this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.