{"id":"CVE-2025-68344","summary":"ALSA: wavefront: Fix integer overflow in sample size validation","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: wavefront: Fix integer overflow in sample size validation\n\nThe wavefront_send_sample() function has an integer overflow issue\nwhen validating sample size. The header-\u003esize field is u32 but gets\ncast to int for comparison with dev-\u003efreemem\n\nFix by using unsigned comparison to avoid integer overflow.","modified":"2026-03-20T12:46:22.941475Z","published":"2025-12-24T10:32:37.615Z","related":["SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","openSUSE-SU-2026:10039-1","openSUSE-SU-2026:10301-1","openSUSE-SU-2026:20145-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68344.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/02b63f3bc29265bd9e83191792d200ed563acacf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0c4a13ba88594fd4a27292853e736c6b4349823d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1823e08f76c68b9e1d26f6d5ef831b96f61a62a0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/488bf86d60077f52810c60dbdf7468c277880167"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4f811071e702fbb74933526e2fbadf8c4ed0c0c4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5588b7c86effffa9bb55383a38800649d7b40778"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bca11de0a277b8baeb7d006f93b543c907b6e782"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d2f5d8cf1eadb7b33e476f59aa9c6653e4f2b937"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68344.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68344"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"488bf86d60077f52810c60dbdf7468c277880167"},{"fixed":"d2f5d8cf1eadb7b33e476f59aa9c6653e4f2b937"},{"fixed":"4f811071e702fbb74933526e2fbadf8c4ed0c0c4"},{"fixed":"02b63f3bc29265bd9e83191792d200ed563acacf"},{"fixed":"5588b7c86effffa9bb55383a38800649d7b40778"},{"fixed":"bca11de0a277b8baeb7d006f93b543c907b6e782"},{"fixed":"1823e08f76c68b9e1d26f6d5ef831b96f61a62a0"},{"fixed":"0c4a13ba88594fd4a27292853e736c6b4349823d"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68344.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.12"},{"fixed":"5.10.248"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.63"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.13"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.18.0"},{"fixed":"6.18.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68344.json"}}],"schema_version":"1.7.5"}