Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-68753— ALSA: firewire-motu: add bounds check in put_user loop for DSP events

EPSS 0.07% · P21
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-68753

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ALSA: firewire-motu: add bounds check in put_user loop for DSP events
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user().
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于firewire-motu驱动中DSP事件处理缺少边界检查,可能导致越界写入。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 634ec0b2906efd46f6f57977e172aa3470aca432 ~ ea2c921d9de6e32ca50cb817b9d57bb881be70de -
LinuxLinux 5.16 -

II. Public POCs for CVE-2025-68753

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-68753

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-01-05 · 16 CVEs total

CVE-2025-68752iavf: Implement settime64 with -EOPNOTSUPP
CVE-2025-68751s390/fpu: Fix false-positive kmsan report in fpu_vstl()
CVE-2025-68754rtc: amlogic-a4: fix double free caused by devm
CVE-2025-68755staging: most: remove broken i2c driver
CVE-2025-68756block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock
CVE-2025-68757drm/vgem-fence: Fix potential deadlock on release
CVE-2025-68758backlight: led-bl: Add devlink to supplier LEDs
CVE-2025-68759wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()
CVE-2025-68760iommu/amd: Fix potential out-of-bounds read in iommu_mmio_show
CVE-2025-68761hfs: fix potential use after free in hfs_correct_next_unused_CNID()
CVE-2025-68762net: netpoll: initialize work queue before error checks
CVE-2025-68763crypto: starfive - Correctly handle return of sg_nents_for_len
CVE-2025-68765mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()
CVE-2025-68764NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags
CVE-2025-68766irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()

IV. Related Vulnerabilities

V. Comments for CVE-2025-68753

No comments yet


Leave a comment