CVE-2025-39710

In the Linux kernel, the following vulnerability has been resolved: media: venus: Add a check for packet size after reading from shared memory Add a check to ensure that the packet size does not exceed the number of available words after reading the packet header from shared memory. This ensures that the size provided by the firmware is safe to process and prevent potential out-of-bounds memory access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

12 Jan 2026, 15:54

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0520c89f6280d2b60ab537d5743601185ee7d8ab - () https://git.kernel.org/stable/c/0520c89f6280d2b60ab537d5743601185ee7d8ab - Patch
References () https://git.kernel.org/stable/c/2d8cea8310a245730816a1fd0c9fa4a5a3bdc68c - () https://git.kernel.org/stable/c/2d8cea8310a245730816a1fd0c9fa4a5a3bdc68c - Patch
References () https://git.kernel.org/stable/c/49befc830daa743e051a65468c05c2ff9e8580e6 - () https://git.kernel.org/stable/c/49befc830daa743e051a65468c05c2ff9e8580e6 - Patch
References () https://git.kernel.org/stable/c/7638bae4539dcebc3f68fda74ac35d73618ec440 - () https://git.kernel.org/stable/c/7638bae4539dcebc3f68fda74ac35d73618ec440 - Patch
References () https://git.kernel.org/stable/c/ba567c2e52fbcf0e20502746bdaa79e911c2e8cf - () https://git.kernel.org/stable/c/ba567c2e52fbcf0e20502746bdaa79e911c2e8cf - Patch
References () https://git.kernel.org/stable/c/ef09b96665f16f3f0bac4e111160e6f24f1f8791 - () https://git.kernel.org/stable/c/ef09b96665f16f3f0bac4e111160e6f24f1f8791 - Patch
References () https://git.kernel.org/stable/c/f0cbd9386f974d310a0d20a02e4a1323e95ea654 - () https://git.kernel.org/stable/c/f0cbd9386f974d310a0d20a02e4a1323e95ea654 - Patch
References () https://git.kernel.org/stable/c/f5b7a943055a4a106d40a03bacd940e28cc1955f - () https://git.kernel.org/stable/c/f5b7a943055a4a106d40a03bacd940e28cc1955f - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-125

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

05 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-05 18:15

Updated : 2026-01-12 15:54


NVD link : CVE-2025-39710

Mitre link : CVE-2025-39710

CVE.ORG link : CVE-2025-39710


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read