CVE-2025-39710Out-of-bounds Read in Linux

CWE-125Out-of-bounds Read30 documents8 sources
Severity
7.1HIGHNVD
EPSS
0.0%
top 98.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 5
Latest updateMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: media: venus: Add a check for packet size after reading from shared memory Add a check to ensure that the packet size does not exceed the number of available words after reading the packet header from shared memory. This ensures that the size provided by the firmware is safe to process and prevent potential out-of-bounds memory access.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages3 packages

NVDlinux/linux_kernel4.135.4.297+6
Debianlinux/linux_kernel< 5.10.244-1+3
CVEListV5linux/linuxd96d3f30c0f2f564f6922bf4ccdf4464992e31fb0520c89f6280d2b60ab537d5743601185ee7d8ab+8

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

3
CVEList
media: venus: Add a check for packet size after reading from shared memory2025-09-05
GHSA
GHSA-cvwp-768v-w5r3: In the Linux kernel, the following vulnerability has been resolved: media: venus: Add a check for packet size after reading from shared memory Add a2025-09-05
OSV
CVE-2025-39710: In the Linux kernel, the following vulnerability has been resolved: media: venus: Add a check for packet size after reading from shared memory Add a c2025-09-05

📋Vendor Advisories

26
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-25
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-04
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2026-03-04
Ubuntu
Linux kernel (Xilinx) vulnerabilities2026-02-24
Ubuntu
Linux kernel (IBM) vulnerabilities2026-02-24
CVE-2025-39710 — Out-of-bounds Read in Linux | cvebase