CVE-2025-23159

In the Linux kernel, the following vulnerability has been resolved: media: venus: hfi: add a check to handle OOB in sfr region sfr->buf_size is in shared memory and can be modified by malicious user. OOB write is possible when the size is made higher than actual sfr data buffer. Cap the size to allocated size for such cases.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

05 Nov 2025, 17:53

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-787
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
References () https://git.kernel.org/stable/c/1b8fb257234e7d2d4b3f48af07c5aa5e11c71634 - () https://git.kernel.org/stable/c/1b8fb257234e7d2d4b3f48af07c5aa5e11c71634 - Patch
References () https://git.kernel.org/stable/c/4dd109038d513b92d4d33524ffc89ba32e02ba48 - () https://git.kernel.org/stable/c/4dd109038d513b92d4d33524ffc89ba32e02ba48 - Patch
References () https://git.kernel.org/stable/c/4e95233af57715d81830fe82b408c633edff59f4 - () https://git.kernel.org/stable/c/4e95233af57715d81830fe82b408c633edff59f4 - Patch
References () https://git.kernel.org/stable/c/530f623f56a6680792499a8404083e17f8ec51f4 - () https://git.kernel.org/stable/c/530f623f56a6680792499a8404083e17f8ec51f4 - Patch
References () https://git.kernel.org/stable/c/5af611c70fb889d46d2f654b8996746e59556750 - () https://git.kernel.org/stable/c/5af611c70fb889d46d2f654b8996746e59556750 - Patch
References () https://git.kernel.org/stable/c/8879397c0da5e5ec1515262995e82cdfd61b282a - () https://git.kernel.org/stable/c/8879397c0da5e5ec1515262995e82cdfd61b282a - Patch
References () https://git.kernel.org/stable/c/a062d8de0be5525ec8c52f070acf7607ec8cbfe4 - () https://git.kernel.org/stable/c/a062d8de0be5525ec8c52f070acf7607ec8cbfe4 - Patch
References () https://git.kernel.org/stable/c/d78a8388a27b265fcb2b8d064f088168ac9356b0 - () https://git.kernel.org/stable/c/d78a8388a27b265fcb2b8d064f088168ac9356b0 - Patch
References () https://git.kernel.org/stable/c/f4b211714bcc70effa60c34d9fa613d182e3ef1e - () https://git.kernel.org/stable/c/f4b211714bcc70effa60c34d9fa613d182e3ef1e - Patch
First Time Debian
Debian debian Linux
Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2025-05-01 13:15

Updated : 2025-11-05 17:53


NVD link : CVE-2025-23159

Mitre link : CVE-2025-23159

CVE.ORG link : CVE-2025-23159


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write