Home

Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: dice: fix buffer overflow in detect_stream_formats() The function detect_stream_formats() reads the stream_count value directly from a FireWire device without validating it. This can lead to out-of-bounds writes when a malicious device provides a stream_count value greater than MAX_STREAMS. Fix by applying the same validation to both TX and RX stream counts in detect_stream_formats().

PUBLISHED Reserved 2025-12-16 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

58579c056c1c9510ae6695ed8e01ee05bbdcfb23 (git) before c0a1fe1902ad23e6d48e0f68be1258ccf7a163e6
affected

58579c056c1c9510ae6695ed8e01ee05bbdcfb23 (git) before 932aa1e80b022419cf9710e970739b7a8794f27c
affected

58579c056c1c9510ae6695ed8e01ee05bbdcfb23 (git) before 1e1b3207a53e50d5a66289fffc1f7d52cd9c50f9
affected

58579c056c1c9510ae6695ed8e01ee05bbdcfb23 (git) before 324f3e03e8a85931ce0880654e3c3eb38b0f0bba
affected

Default status
affected

4.18
affected

Any version before 4.18
unaffected

6.12.63 (semver)
unaffected

6.17.13 (semver)
unaffected

6.18.2 (semver)
unaffected

6.19-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/c0a1fe1902ad23e6d48e0f68be1258ccf7a163e6

git.kernel.org/...c/932aa1e80b022419cf9710e970739b7a8794f27c

git.kernel.org/...c/1e1b3207a53e50d5a66289fffc1f7d52cd9c50f9

git.kernel.org/...c/324f3e03e8a85931ce0880654e3c3eb38b0f0bba

cve.org (CVE-2025-68346)

nvd.nist.gov (CVE-2025-68346)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.