In the Linux kernel, the following vulnerability has been resolved:
media: venus: Add a check for packet size after reading from shared memory
Add a check to ensure that the packet size does not exceed the number of
available words after reading the packet header from shared memory. This
ensures that the size provided by the firmware is safe to process and
prevent potential out-of-bounds memory access.
Metrics
Affected Vendors & Products
References
History
Sat, 06 Sep 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Vendors & Products |
Linux
Linux linux Kernel |
Sat, 06 Sep 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 05 Sep 2025 17:30:00 +0000

Status: PUBLISHED
Assigner: Linux
Published: 2025-09-05T17:21:17.243Z
Updated: 2025-09-05T17:21:17.243Z
Reserved: 2025-04-16T07:20:57.116Z
Link: CVE-2025-39710

No data.

Status : Awaiting Analysis
Published: 2025-09-05T18:15:48.333
Modified: 2025-09-08T16:25:38.810
Link: CVE-2025-39710
