CVE-2025-23156

In the Linux kernel, the following vulnerability has been resolved: media: venus: hfi_parser: refactor hfi packet parsing logic words_count denotes the number of words in total payload, while data points to payload of various property within it. When words_count reaches last word, data can access memory beyond the total payload. This can lead to OOB access. With this patch, the utility api for handling individual properties now returns the size of data consumed. Accordingly remaining bytes are calculated before parsing the payload, thereby eliminates the OOB access possibilities.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

05 Nov 2025, 17:57

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/05b07e52a0d08239147ba3460045855f4fb398de - () https://git.kernel.org/stable/c/05b07e52a0d08239147ba3460045855f4fb398de - Patch
References () https://git.kernel.org/stable/c/0beabe9b49190a02321b02792b29fc0f0e28b51f - () https://git.kernel.org/stable/c/0beabe9b49190a02321b02792b29fc0f0e28b51f - Patch
References () https://git.kernel.org/stable/c/0f9a4bab7d83738963365372e4745854938eab2d - () https://git.kernel.org/stable/c/0f9a4bab7d83738963365372e4745854938eab2d - Patch
References () https://git.kernel.org/stable/c/6d278c5548d840c4d85d445347b2a5c31b2ab3a0 - () https://git.kernel.org/stable/c/6d278c5548d840c4d85d445347b2a5c31b2ab3a0 - Patch
References () https://git.kernel.org/stable/c/9edaaa8e3e15aab1ca413ab50556de1975bcb329 - () https://git.kernel.org/stable/c/9edaaa8e3e15aab1ca413ab50556de1975bcb329 - Patch
References () https://git.kernel.org/stable/c/a736c72d476d1c7ca7be5018f2614ee61168ad01 - () https://git.kernel.org/stable/c/a736c72d476d1c7ca7be5018f2614ee61168ad01 - Patch
References () https://git.kernel.org/stable/c/bb3fd8b7906a12dc2b61389abb742bf6542d97fb - () https://git.kernel.org/stable/c/bb3fd8b7906a12dc2b61389abb742bf6542d97fb - Patch
References () https://git.kernel.org/stable/c/f195e94c7af921d99abd79f57026a218d191d2c7 - () https://git.kernel.org/stable/c/f195e94c7af921d99abd79f57026a218d191d2c7 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CWE CWE-125
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel

03 Nov 2025, 20:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

02 May 2025, 13:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: venus: hfi_parser: refactorización de la lógica de análisis de paquetes HFI. words_count indica el número de palabras en el payload total, mientras que data apunta al payload de varias propiedades dentro de ella. Cuando words_count alcanza la última palabra, data puede acceder a memoria más allá de payload total. Esto puede provocar accesos fuera de banda (OOB). Con este parche, la API de utilidad para gestionar propiedades individuales ahora devuelve el tamaño de los datos consumidos. Por consiguiente, los bytes restantes se calculan antes de analizar el payload, eliminando así las posibilidades de accesos fuera de banda (OOB).

02 May 2025, 07:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/0beabe9b49190a02321b02792b29fc0f0e28b51f -
  • () https://git.kernel.org/stable/c/f195e94c7af921d99abd79f57026a218d191d2c7 -

01 May 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 13:15

Updated : 2025-11-05 17:57


NVD link : CVE-2025-23156

Mitre link : CVE-2025-23156

CVE.ORG link : CVE-2025-23156


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read