« List of all CVEs

CVE-2025-39710

media: venus: Add a check for packet size after reading from shared memory

Published: 9/5/2025 Last updated: 11/3/2025 Reserved: 4/16/2025

In the Linux kernel, the following vulnerability has been resolved: media: venus: Add a check for packet size after reading from shared memory Add a check to ensure that the packet size does not exceed the number of available words after reading the packet header from shared memory. This ensures that the size provided by the firmware is safe to process and prevent potential out-of-bounds memory access.

CNA assigner: Linux (416baaa9-dc9f-4396-8d5f-8c081fb06d67) Requested by: n/a

Opam packages affected (28)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes orun rawlink rawlink-eio rawlink-lwt restricted shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (4)

Product Vendor Version
Linux Linux < e2ba996577eaea423694dc69ae43d56f1410a22b
Linux Linux < a42ac16e6573f19c78f556ea292f5b534fcc4514
Linux Linux < 2.02-2ubuntu8.16
Linux Linux V200R007C01

References (20)