CVE-2025-39714

In the Linux kernel, the following vulnerability has been resolved: media: usbtv: Lock resolution while streaming When an program is streaming (ffplay) and another program (qv4l2) changes the TV standard from NTSC to PAL, the kernel crashes due to trying to copy to unmapped memory. Changing from NTSC to PAL increases the resolution in the usbtv struct, but the video plane buffer isn't adjusted, so it overflows. [hverkuil: call vb2_is_busy instead of vb2_is_streaming]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

12 Jan 2026, 15:54

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/3d83d0b5ae5045a7a246ed116b5f6c688a12f9e9 - () https://git.kernel.org/stable/c/3d83d0b5ae5045a7a246ed116b5f6c688a12f9e9 - Patch
References () https://git.kernel.org/stable/c/5427dda195d6baf23028196fd55a0c90f66ffa61 - () https://git.kernel.org/stable/c/5427dda195d6baf23028196fd55a0c90f66ffa61 - Patch
References () https://git.kernel.org/stable/c/7e40e0bb778907b2441bff68d73c3eb6b6cd319f - () https://git.kernel.org/stable/c/7e40e0bb778907b2441bff68d73c3eb6b6cd319f - Patch
References () https://git.kernel.org/stable/c/9f886d21e235c4bd038cb20f6696084304197ab3 - () https://git.kernel.org/stable/c/9f886d21e235c4bd038cb20f6696084304197ab3 - Patch
References () https://git.kernel.org/stable/c/c35e7c7a004ef379a1ae7c7486d4829419acad1d - () https://git.kernel.org/stable/c/c35e7c7a004ef379a1ae7c7486d4829419acad1d - Patch
References () https://git.kernel.org/stable/c/c3d75524e10021aa5c223d94da4996640aed46c0 - () https://git.kernel.org/stable/c/c3d75524e10021aa5c223d94da4996640aed46c0 - Patch
References () https://git.kernel.org/stable/c/ee7bade8b9244834229b12b6e1e724939bedd484 - () https://git.kernel.org/stable/c/ee7bade8b9244834229b12b6e1e724939bedd484 - Patch
References () https://git.kernel.org/stable/c/ef9b3c22405192afaa279077ddd45a51db90b83d - () https://git.kernel.org/stable/c/ef9b3c22405192afaa279077ddd45a51db90b83d - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

05 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-05 18:15

Updated : 2026-01-12 15:54


NVD link : CVE-2025-39714

Mitre link : CVE-2025-39714

CVE.ORG link : CVE-2025-39714


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel