VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2025-68347

CVE-2025-68347

Description

In the Linux kernel, the following vulnerability has been resolved:

ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events

The DSP event handling code in hwdep_read() could write more bytes to the user buffer than requested, when a user provides a buffer smaller than the event header size (8 bytes).

Fix by using min_t() to clamp the copy size, This ensures we never copy more than the user requested.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's ALSA firewire-motu driver, a buffer overflow in hwdep_read for DSP events occurs when a user-supplied buffer is smaller than 8 bytes, and is fixed by clamping the copy size.

A buffer overflow vulnerability was found in the Linux kernel's ALSA firewire-motu driver, specifically in the hwdep_read() function for DSP events. The root cause is that when a user provides a buffer smaller than the event header size (8 bytes), the function copies more bytes than requested, leading to an out-of-bounds write on the user buffer.

Exploitation

To trigger this bug, an attacker would need local access to a system with a FireWire MOTU audio device and the ability to read from the hwdep character device. The exploit path involves deliberately providing a buffer smaller than 8 bytes to hwdep_read(), causing the copy operation to write beyond the user-supplied memory.

Impact

Successful exploitation could permit a local attacker to corrupt heap metadata or other sensitive data, potentially leading to privilege escalation or a denial-of-service (system crash). The buffer overflow overwrites memory beyond the intended buffer, making it a classical memory safety issue.

Mitigation

The fix is included in the Linux kernel stable branches, applying a min_t() boundary check to clamp the copy size to the user-requested length [1][2]. Users should update to the latest patched kernel versions.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.