{"id":"CVE-2025-39710","summary":"media: venus: Add a check for packet size after reading from shared memory","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: venus: Add a check for packet size after reading from shared memory\n\nAdd a check to ensure that the packet size does not exceed the number of\navailable words after reading the packet header from shared memory. This\nensures that the size provided by the firmware is safe to process and\nprevent potential out-of-bounds memory access.","modified":"2026-03-20T12:43:00.936060Z","published":"2025-09-05T17:21:17.243Z","related":["MGASA-2025-0234","MGASA-2025-0235","SUSE-SU-2025:03600-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","openSUSE-SU-2025:20081-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39710.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0520c89f6280d2b60ab537d5743601185ee7d8ab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2d8cea8310a245730816a1fd0c9fa4a5a3bdc68c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/49befc830daa743e051a65468c05c2ff9e8580e6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7638bae4539dcebc3f68fda74ac35d73618ec440"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ba567c2e52fbcf0e20502746bdaa79e911c2e8cf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ef09b96665f16f3f0bac4e111160e6f24f1f8791"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f0cbd9386f974d310a0d20a02e4a1323e95ea654"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f5b7a943055a4a106d40a03bacd940e28cc1955f"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39710.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39710"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d96d3f30c0f2f564f6922bf4ccdf4464992e31fb"},{"fixed":"0520c89f6280d2b60ab537d5743601185ee7d8ab"},{"fixed":"f5b7a943055a4a106d40a03bacd940e28cc1955f"},{"fixed":"ef09b96665f16f3f0bac4e111160e6f24f1f8791"},{"fixed":"7638bae4539dcebc3f68fda74ac35d73618ec440"},{"fixed":"ba567c2e52fbcf0e20502746bdaa79e911c2e8cf"},{"fixed":"2d8cea8310a245730816a1fd0c9fa4a5a3bdc68c"},{"fixed":"f0cbd9386f974d310a0d20a02e4a1323e95ea654"},{"fixed":"49befc830daa743e051a65468c05c2ff9e8580e6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39710.json"}}],"schema_version":"1.7.5"}