In the Linux kernel, the following vulnerability has been resolved:
media: venus: hfi_parser: refactor hfi packet parsing logic
words_count denotes the number of words in total payload, while data
points to payload of various property within it. When words_count
reaches last word, data can access memory beyond the total payload. This
can lead to OOB access. With this patch, the utility api for handling
individual properties now returns the size of data consumed. Accordingly
remaining bytes are calculated before parsing the payload, thereby
eliminates the OOB access possibilities.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
05 Nov 2025, 17:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/05b07e52a0d08239147ba3460045855f4fb398de - Patch | |
| References | () https://git.kernel.org/stable/c/0beabe9b49190a02321b02792b29fc0f0e28b51f - Patch | |
| References | () https://git.kernel.org/stable/c/0f9a4bab7d83738963365372e4745854938eab2d - Patch | |
| References | () https://git.kernel.org/stable/c/6d278c5548d840c4d85d445347b2a5c31b2ab3a0 - Patch | |
| References | () https://git.kernel.org/stable/c/9edaaa8e3e15aab1ca413ab50556de1975bcb329 - Patch | |
| References | () https://git.kernel.org/stable/c/a736c72d476d1c7ca7be5018f2614ee61168ad01 - Patch | |
| References | () https://git.kernel.org/stable/c/bb3fd8b7906a12dc2b61389abb742bf6542d97fb - Patch | |
| References | () https://git.kernel.org/stable/c/f195e94c7af921d99abd79f57026a218d191d2c7 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| CWE | CWE-125 | |
| First Time |
Debian debian Linux
Linux Debian Linux linux Kernel |
03 Nov 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
02 May 2025, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
02 May 2025, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 May 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-01 13:15
Updated : 2025-11-05 17:57
NVD link : CVE-2025-23156
Mitre link : CVE-2025-23156
CVE.ORG link : CVE-2025-23156
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
