Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-68753

Опубликовано: 05 янв. 2026
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user().

A buffer overwrite vulnerability was found in the Linux kernel's ALSA firewire-motu driver. When handling DSP events, the put_user() loop copies event data to userspace without properly checking if the user buffer size is aligned to 4 bytes. If the buffer is misaligned, the copy operation can write beyond the intended buffer boundary.

Отчет

This vulnerability requires local access and the presence of FireWire MOTU audio hardware. The overwrite occurs in userspace memory provided by the calling application, limiting the security impact. Standard Red Hat Enterprise Linux configurations do not typically include FireWire audio hardware support.

Меры по смягчению последствий

To mitigate this issue, prevent the snd_firewire_motu module from being loaded if MOTU FireWire audio devices are not required. See https://access.redhat.com/solutions/41278 for instructions on how to blacklist a kernel module.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelFix deferred
Red Hat Enterprise Linux 8kernel-rtFix deferred
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2427116kernel: ALSA: firewire-motu: add bounds check in put_user loop for DSP events

EPSS

Процентиль: 17%
0.00053
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user().

nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user().

CVSS3: 7.8
msrc
3 месяца назад

ALSA: firewire-motu: add bounds check in put_user loop for DSP events

debian
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: A ...

github
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user().

EPSS

Процентиль: 17%
0.00053
Низкий

5.5 Medium

CVSS3