CVE-2025-23158

In the Linux kernel, the following vulnerability has been resolved: media: venus: hfi: add check to handle incorrect queue size qsize represents size of shared queued between driver and video firmware. Firmware can modify this value to an invalid large value. In such situation, empty_space will be bigger than the space actually available. Since new_wr_idx is not checked, so the following code will result in an OOB write. ... qsize = qhdr->q_size if (wr_idx >= rd_idx) empty_space = qsize - (wr_idx - rd_idx) .... if (new_wr_idx < qsize) { memcpy(wr_ptr, packet, dwords << 2) --> OOB write Add check to ensure qsize is within the allocated size while reading and writing packets into the queue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

05 Nov 2025, 17:55

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CWE CWE-787
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel
References () https://git.kernel.org/stable/c/101a86619aab42bb61f2253bbf720121022eab86 - () https://git.kernel.org/stable/c/101a86619aab42bb61f2253bbf720121022eab86 - Patch
References () https://git.kernel.org/stable/c/1b86c1917e16bafbbb08ab90baaff533aa36c62d - () https://git.kernel.org/stable/c/1b86c1917e16bafbbb08ab90baaff533aa36c62d - Patch
References () https://git.kernel.org/stable/c/32af5c1fdb9bc274f52ee0472d3b060b18e4aab4 - () https://git.kernel.org/stable/c/32af5c1fdb9bc274f52ee0472d3b060b18e4aab4 - Patch
References () https://git.kernel.org/stable/c/40084302f639b3fe954398c5ba5ee556b7242b54 - () https://git.kernel.org/stable/c/40084302f639b3fe954398c5ba5ee556b7242b54 - Patch
References () https://git.kernel.org/stable/c/679424f8b31446f90080befd0300ea915485b096 - () https://git.kernel.org/stable/c/679424f8b31446f90080befd0300ea915485b096 - Patch
References () https://git.kernel.org/stable/c/69baf245b23e20efda0079238b27fc63ecf13de1 - () https://git.kernel.org/stable/c/69baf245b23e20efda0079238b27fc63ecf13de1 - Patch
References () https://git.kernel.org/stable/c/a45957bcde529169188929816775a575de77d84f - () https://git.kernel.org/stable/c/a45957bcde529169188929816775a575de77d84f - Patch
References () https://git.kernel.org/stable/c/cf5f7bb4e0d786f4d9d50ae6b5963935eab71d75 - () https://git.kernel.org/stable/c/cf5f7bb4e0d786f4d9d50ae6b5963935eab71d75 - Patch
References () https://git.kernel.org/stable/c/edb89d69b1438681daaf5ca90aed3242df94cc96 - () https://git.kernel.org/stable/c/edb89d69b1438681daaf5ca90aed3242df94cc96 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

03 Nov 2025, 20:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

02 May 2025, 13:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: venus: hfi: se ha añadido una comprobación para gestionar el tamaño incorrecto de queue size qsize representa el tamaño de la cola compartida entre el controlador y el firmware de vídeo. El firmware puede modificar este valor a un valor grande no válido. En tal situación, el espacio vacío será mayor que el espacio realmente disponible. Dado que new_wr_idx no se comprueba, el siguiente código resultará en una escritura fuera de banda (OOB). ... qsize = qhdr-&gt;q_size if (wr_idx &gt;= rd_idx) empty_space = qsize - (wr_idx - rd_idx) .... if (new_wr_idx &lt; qsize) { memcpy(wr_ptr, packet, dwords &lt;&lt; 2) --&gt; Escritura fuera de banda (OOB). Se ha añadido una comprobación para garantizar que qsize se encuentre dentro del tamaño asignado al leer y escribir paquetes en la cola.

02 May 2025, 07:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/1b86c1917e16bafbbb08ab90baaff533aa36c62d -
  • () https://git.kernel.org/stable/c/32af5c1fdb9bc274f52ee0472d3b060b18e4aab4 -
  • () https://git.kernel.org/stable/c/a45957bcde529169188929816775a575de77d84f -

01 May 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 13:15

Updated : 2025-11-05 17:55


NVD link : CVE-2025-23158

Mitre link : CVE-2025-23158

CVE.ORG link : CVE-2025-23158


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write