CVE-2025-38679
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-125
Lectura fuera de límites
Fecha de publicación:
04/09/2025
Última modificación:
08/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: venus: Fix OOB read due to missing payload bound check<br />
<br />
Currently, The event_seq_changed() handler processes a variable number<br />
of properties sent by the firmware. The number of properties is indicated<br />
by the firmware and used to iterate over the payload. However, the<br />
payload size is not being validated against the actual message length.<br />
<br />
This can lead to out-of-bounds memory access if the firmware provides a<br />
property count that exceeds the data available in the payload. Such a<br />
condition can result in kernel crashes or potential information leaks if<br />
memory beyond the buffer is accessed.<br />
<br />
Fix this by properly validating the remaining size of the payload before<br />
each property access and updating bounds accordingly as properties are<br />
parsed.<br />
<br />
This ensures that property parsing is safely bounded within the received<br />
message buffer and protects against malformed or malicious firmware<br />
behavior.
Impacto
Puntuación base 3.x
7.10
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.13 (incluyendo) | 6.1.149 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.103 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.43 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.15.11 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (incluyendo) | 6.16.2 (excluyendo) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/06d6770ff0d8cc8dfd392329a8cc03e2a83e7289
- https://git.kernel.org/stable/c/6f08bfb5805637419902f3d70069fe17a404545b
- https://git.kernel.org/stable/c/8f274e2b05fdae7a53cee83979202b5ecb49035c
- https://git.kernel.org/stable/c/a3eef5847603cd8a4110587907988c3f93c9605a
- https://git.kernel.org/stable/c/bed4921055dd7bb4d2eea2729852ae18cf97a2c6
- https://git.kernel.org/stable/c/c956c3758510b448b3d4d10d1da8230e8c9bf668
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



