VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2025-68346

CVE-2025-68346

Description

In the Linux kernel, the following vulnerability has been resolved:

ALSA: dice: fix buffer overflow in detect_stream_formats()

The function detect_stream_formats() reads the stream_count value directly from a FireWire device without validating it. This can lead to out-of-bounds writes when a malicious device provides a stream_count value greater than MAX_STREAMS.

Fix by applying the same validation to both TX and RX stream counts in detect_stream_formats().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's ALSA dice driver, a missing bounds check on FireWire device stream counts can cause a buffer overflow.

Vulnerability

The detect_stream_formats() function in the ALSA dice driver reads the stream_count value directly from a FireWire device without validating it against the MAX_STREAMS limit. This lack of validation can lead to out-of-bounds writes when a malicious or malformed device provides a stream_count value greater than MAX_STREAMS [1][2][3][4].

Exploitation

An attacker with physical access to the FireWire bus or the ability to connect a malicious FireWire device can supply a crafted stream_count value. No authentication is required beyond device enumeration. The attack surface is limited to systems with the snd-dice driver loaded and a FireWire controller present.

Impact

Successful exploitation results in a buffer overflow, potentially causing memory corruption, system crash, or arbitrary code execution in kernel context. The vulnerability is rated with a CVSS score that reflects the high impact on confidentiality, integrity, and availability.

Mitigation

The fix applies the same validation to both TX and RX stream counts in detect_stream_formats(), ensuring that values before use. The patch has been merged into the stable kernel tree and is available in the referenced commits [1][2][3][4]. Users should update to a kernel version containing the fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.