We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-23157

media: venus: hfi_parser: add check to avoid out of bound access



Description

In the Linux kernel, the following vulnerability has been resolved: media: venus: hfi_parser: add check to avoid out of bound access There is a possibility that init_codecs is invoked multiple times during manipulated payload from video firmware. In such case, if codecs_count can get incremented to value more than MAX_CODEC_NUM, there can be OOB access. Reset the count so that it always starts from beginning.

Reserved 2025-01-11 | Published 2025-05-01 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

1a73374a04e555103e5369429a30999114001dda before e5133a0b25463674903fdc0528e0a29b7267130e
affected

1a73374a04e555103e5369429a30999114001dda before 2b8b9ea4e26a501eb220ea189e42b4527e65bdfa
affected

1a73374a04e555103e5369429a30999114001dda before 1ad6aa1464b8a5ce5c194458315021e8d216108e
affected

1a73374a04e555103e5369429a30999114001dda before 26bbedd06d85770581fda5d78e78539bb088fad1
affected

1a73374a04e555103e5369429a30999114001dda before d4d88ece4ba91df5b02f1d3f599650f9e9fc0f45
affected

1a73374a04e555103e5369429a30999114001dda before 53e376178ceacca3ef1795038b22fc9ef45ff1d3
affected

1a73374a04e555103e5369429a30999114001dda before b2541e29d82da8a0df728aadec3e0a8db55d517b
affected

1a73374a04e555103e5369429a30999114001dda before cb5be9039f91979f8a2fac29f529f746d7848f3e
affected

1a73374a04e555103e5369429a30999114001dda before 172bf5a9ef70a399bb227809db78442dc01d9e48
affected

Default status
affected

4.19
affected

Any version before 4.19
unaffected

5.4.293
unaffected

5.10.237
unaffected

5.15.181
unaffected

6.1.135
unaffected

6.6.88
unaffected

6.12.24
unaffected

6.13.12
unaffected

6.14.3
unaffected

6.15
unaffected

References

git.kernel.org/...c/e5133a0b25463674903fdc0528e0a29b7267130e

git.kernel.org/...c/2b8b9ea4e26a501eb220ea189e42b4527e65bdfa

git.kernel.org/...c/1ad6aa1464b8a5ce5c194458315021e8d216108e

git.kernel.org/...c/26bbedd06d85770581fda5d78e78539bb088fad1

git.kernel.org/...c/d4d88ece4ba91df5b02f1d3f599650f9e9fc0f45

git.kernel.org/...c/53e376178ceacca3ef1795038b22fc9ef45ff1d3

git.kernel.org/...c/b2541e29d82da8a0df728aadec3e0a8db55d517b

git.kernel.org/...c/cb5be9039f91979f8a2fac29f529f746d7848f3e

git.kernel.org/...c/172bf5a9ef70a399bb227809db78442dc01d9e48

cve.org (CVE-2025-23157)

nvd.nist.gov (CVE-2025-23157)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-23157

Support options

Helpdesk Chat, Email, Knowledgebase