In the Linux kernel, the following vulnerability has been resolved:
media: venus: Add a check for packet size after reading from shared memory
Add a check to ensure that the packet size does not exceed the number of
available words after reading the packet header from shared memory. This
ensures that the size provided by the firmware is safe to process and
prevent potential out-of-bounds memory access.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
12 Jan 2026, 15:54
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/0520c89f6280d2b60ab537d5743601185ee7d8ab - Patch | |
| References | () https://git.kernel.org/stable/c/2d8cea8310a245730816a1fd0c9fa4a5a3bdc68c - Patch | |
| References | () https://git.kernel.org/stable/c/49befc830daa743e051a65468c05c2ff9e8580e6 - Patch | |
| References | () https://git.kernel.org/stable/c/7638bae4539dcebc3f68fda74ac35d73618ec440 - Patch | |
| References | () https://git.kernel.org/stable/c/ba567c2e52fbcf0e20502746bdaa79e911c2e8cf - Patch | |
| References | () https://git.kernel.org/stable/c/ef09b96665f16f3f0bac4e111160e6f24f1f8791 - Patch | |
| References | () https://git.kernel.org/stable/c/f0cbd9386f974d310a0d20a02e4a1323e95ea654 - Patch | |
| References | () https://git.kernel.org/stable/c/f5b7a943055a4a106d40a03bacd940e28cc1955f - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-125 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
05 Sep 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-05 18:15
Updated : 2026-01-12 15:54
NVD link : CVE-2025-39710
Mitre link : CVE-2025-39710
CVE.ORG link : CVE-2025-39710
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
