Bug 2424513 (CVE-2025-34457) - CVE-2025-34457 github.com/wb2osz/direwolf: Dire Wolf: Denial of Service due to stack-based buffer overflow in KISS frame processing
Summary: CVE-2025-34457 github.com/wb2osz/direwolf: Dire Wolf: Denial of Service due t...
Keywords:
Status: NEW
Alias: CVE-2025-34457
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2424539 2424540
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-12-22 22:04 UTC by OSIDB Bzimport
Modified: 2026-01-08 01:35 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-12-22 22:04:20 UTC
wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition.


Note You need to log in before you can comment on or make changes to this bug.