CVE-2025-34458

NameCVE-2025-34458
Descriptionwb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 3658a87, contain a reachable assertion vulnerability in the APRS MIC-E decoder function aprs_mic_e() located in src/decode_aprs.c. When processing a specially crafted AX.25 frame containing a MIC-E message with an empty or truncated comment field, the application triggers an unhandled assertion checking for a non-empty comment. This assertion failure causes immediate process termination, allowing a remote, unauthenticated attacker to cause a denial of service by sending malformed APRS traffic.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1123925

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
direwolf (PTS)bullseye1.6+dfsg-1fixed
bookworm1.6+dfsg-3fixed
trixie1.7+dfsg-2fixed
forky, sid1.8.1+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
direwolfsourcebullseye(not affected)
direwolfsourcebookworm(not affected)
direwolfsourcetrixie(not affected)
direwolfsource(unstable)1.8.1+dfsg-2unimportant1123925

Notes

[trixie] - direwolf <not-affected> (Vulnerable code introduced later)
[bookworm] - direwolf <not-affected> (Vulnerable code introduced later)
[bullseye] - direwolf <not-affected> (Vulnerable code introduced later)
https://github.com/wb2osz/direwolf/issues/618
Introduced with: https://github.com/wb2osz/direwolf/commit/46f31d4453ed133c99db71a514deacebae19f877 (1.8-beta1)
Fixed by: https://github.com/wb2osz/direwolf/commit/3658a878920803bbb69a4567579dcc4d6cb80a92 (dev)
Crash in CLI tool, no security impact

Search for package or bug name: Reporting problems