CVE-2025-34457

NameCVE-2025-34457
Descriptionwb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1123925

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
direwolf (PTS)bullseye1.6+dfsg-1vulnerable
bookworm1.6+dfsg-3vulnerable
trixie1.7+dfsg-2vulnerable
forky, sid1.8.1+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
direwolfsource(unstable)(unfixed)1123925

Notes

[trixie] - direwolf <no-dsa> (Minor issue)
[bookworm] - direwolf <no-dsa> (Minor issue)
https://github.com/wb2osz/direwolf/issues/617
Fixed by: https://github.com/wb2osz/direwolf/commit/694c95485b21c1c22bc4682703771dec4d7a374b (dev)

Search for package or bug name: Reporting problems