CVE-2025-23158

In the Linux kernel, the following vulnerability has been resolved: media: venus: hfi: add check to handle incorrect queue size qsize represents size of shared queued between driver and video firmware. Firmware can modify this value to an invalid large value. In such situation, empty_space will be bigger than the space actually available. Since new_wr_idx is not checked, so the following code will result in an OOB write. ... qsize = qhdr->q_size if (wr_idx >= rd_idx) empty_space = qsize - (wr_idx - rd_idx) .... if (new_wr_idx < qsize) { memcpy(wr_ptr, packet, dwords << 2) --> OOB write Add check to ensure qsize is within the allocated size while reading and writing packets into the queue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

05 Nov 2025, 17:55

Type Values Removed Values Added
First Time Debian
Debian debian Linux
Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
References () https://git.kernel.org/stable/c/101a86619aab42bb61f2253bbf720121022eab86 - () https://git.kernel.org/stable/c/101a86619aab42bb61f2253bbf720121022eab86 - Patch
References () https://git.kernel.org/stable/c/1b86c1917e16bafbbb08ab90baaff533aa36c62d - () https://git.kernel.org/stable/c/1b86c1917e16bafbbb08ab90baaff533aa36c62d - Patch
References () https://git.kernel.org/stable/c/32af5c1fdb9bc274f52ee0472d3b060b18e4aab4 - () https://git.kernel.org/stable/c/32af5c1fdb9bc274f52ee0472d3b060b18e4aab4 - Patch
References () https://git.kernel.org/stable/c/40084302f639b3fe954398c5ba5ee556b7242b54 - () https://git.kernel.org/stable/c/40084302f639b3fe954398c5ba5ee556b7242b54 - Patch
References () https://git.kernel.org/stable/c/679424f8b31446f90080befd0300ea915485b096 - () https://git.kernel.org/stable/c/679424f8b31446f90080befd0300ea915485b096 - Patch
References () https://git.kernel.org/stable/c/69baf245b23e20efda0079238b27fc63ecf13de1 - () https://git.kernel.org/stable/c/69baf245b23e20efda0079238b27fc63ecf13de1 - Patch
References () https://git.kernel.org/stable/c/a45957bcde529169188929816775a575de77d84f - () https://git.kernel.org/stable/c/a45957bcde529169188929816775a575de77d84f - Patch
References () https://git.kernel.org/stable/c/cf5f7bb4e0d786f4d9d50ae6b5963935eab71d75 - () https://git.kernel.org/stable/c/cf5f7bb4e0d786f4d9d50ae6b5963935eab71d75 - Patch
References () https://git.kernel.org/stable/c/edb89d69b1438681daaf5ca90aed3242df94cc96 - () https://git.kernel.org/stable/c/edb89d69b1438681daaf5ca90aed3242df94cc96 - Patch
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Information

Published : 2025-05-01 13:15

Updated : 2025-11-05 17:55


NVD link : CVE-2025-23158

Mitre link : CVE-2025-23158

CVE.ORG link : CVE-2025-23158


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write