{"id":"CVE-2025-38679","summary":"media: venus: Fix OOB read due to missing payload bound check","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: venus: Fix OOB read due to missing payload bound check\n\nCurrently, The event_seq_changed() handler processes a variable number\nof properties sent by the firmware. The number of properties is indicated\nby the firmware and used to iterate over the payload. However, the\npayload size is not being validated against the actual message length.\n\nThis can lead to out-of-bounds memory access if the firmware provides a\nproperty count that exceeds the data available in the payload. Such a\ncondition can result in kernel crashes or potential information leaks if\nmemory beyond the buffer is accessed.\n\nFix this by properly validating the remaining size of the payload before\neach property access and updating bounds accordingly as properties are\nparsed.\n\nThis ensures that property parsing is safely bounded within the received\nmessage buffer and protects against malformed or malicious firmware\nbehavior.","modified":"2026-04-02T12:48:04.982297Z","published":"2025-09-04T15:32:35.131Z","related":["MGASA-2025-0234","MGASA-2025-0235","SUSE-SU-2025:03600-1","SUSE-SU-2025:03601-1","SUSE-SU-2025:03602-1","SUSE-SU-2025:03633-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2025:3725-1","SUSE-SU-2025:3751-1","openSUSE-SU-2025:20081-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38679.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/06d6770ff0d8cc8dfd392329a8cc03e2a83e7289"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f08bfb5805637419902f3d70069fe17a404545b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8f274e2b05fdae7a53cee83979202b5ecb49035c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a3eef5847603cd8a4110587907988c3f93c9605a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bed4921055dd7bb4d2eea2729852ae18cf97a2c6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c956c3758510b448b3d4d10d1da8230e8c9bf668"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38679.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38679"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"09c2845e8fe4fcab942929480203f504a6e0a114"},{"fixed":"a3eef5847603cd8a4110587907988c3f93c9605a"},{"fixed":"8f274e2b05fdae7a53cee83979202b5ecb49035c"},{"fixed":"6f08bfb5805637419902f3d70069fe17a404545b"},{"fixed":"c956c3758510b448b3d4d10d1da8230e8c9bf668"},{"fixed":"bed4921055dd7bb4d2eea2729852ae18cf97a2c6"},{"fixed":"06d6770ff0d8cc8dfd392329a8cc03e2a83e7289"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38679.json"}}],"schema_version":"1.7.5"}