CVE-2025-23159
media: venus: hfi: add a check to handle OOB in sfr region
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: media: venus: hfi: add a check to handle OOB in sfr region sfr->buf_size is in shared memory and can be modified by malicious user. OOB write is possible when the size is made higher than actual sfr data buffer. Cap the size to allocated size for such cases.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | May 1, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
d96d3f30c0f2f564f6922bf4ccdf4464992e31fb < 4dd109038d513b92d4d33524ffc89ba32e02ba48 d96d3f30c0f2f564f6922bf4ccdf4464992e31fb < 8879397c0da5e5ec1515262995e82cdfd61b282a d96d3f30c0f2f564f6922bf4ccdf4464992e31fb < 1b8fb257234e7d2d4b3f48af07c5aa5e11c71634 d96d3f30c0f2f564f6922bf4ccdf4464992e31fb < 4e95233af57715d81830fe82b408c633edff59f4 d96d3f30c0f2f564f6922bf4ccdf4464992e31fb < 5af611c70fb889d46d2f654b8996746e59556750 d96d3f30c0f2f564f6922bf4ccdf4464992e31fb < 530f623f56a6680792499a8404083e17f8ec51f4 d96d3f30c0f2f564f6922bf4ccdf4464992e31fb < a062d8de0be5525ec8c52f070acf7607ec8cbfe4 d96d3f30c0f2f564f6922bf4ccdf4464992e31fb < d78a8388a27b265fcb2b8d064f088168ac9356b0 d96d3f30c0f2f564f6922bf4ccdf4464992e31fb < f4b211714bcc70effa60c34d9fa613d182e3ef1e
Linux / Linux
4.13
References
git.kernel.org: https://git.kernel.org/stable/c/4dd109038d513b92d4d33524ffc89ba32e02ba48 git.kernel.org: https://git.kernel.org/stable/c/8879397c0da5e5ec1515262995e82cdfd61b282a git.kernel.org: https://git.kernel.org/stable/c/1b8fb257234e7d2d4b3f48af07c5aa5e11c71634 git.kernel.org: https://git.kernel.org/stable/c/4e95233af57715d81830fe82b408c633edff59f4 git.kernel.org: https://git.kernel.org/stable/c/5af611c70fb889d46d2f654b8996746e59556750 git.kernel.org: https://git.kernel.org/stable/c/530f623f56a6680792499a8404083e17f8ec51f4 git.kernel.org: https://git.kernel.org/stable/c/a062d8de0be5525ec8c52f070acf7607ec8cbfe4 git.kernel.org: https://git.kernel.org/stable/c/d78a8388a27b265fcb2b8d064f088168ac9356b0 git.kernel.org: https://git.kernel.org/stable/c/f4b211714bcc70effa60c34d9fa613d182e3ef1e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html