media: usbtv: Lock resolution while streaming
Summary
| CVE | CVE-2025-39714 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2025-09-05 18:15:48 UTC |
| Updated | 2026-05-12 13:17:07 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: media: usbtv: Lock resolution while streaming When an program is streaming (ffplay) and another program (qv4l2) changes the TV standard from NTSC to PAL, the kernel crashes due to trying to copy to unmapped memory. Changing from NTSC to PAL increases the resolution in the usbtv struct, but the video plane buffer isn't adjusted, so it overflows. [hverkuil: call vb2_is_busy instead of vb2_is_streaming] |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Problem Types: NVD-CWE-noinfo
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 c35e7c7a004ef379a1ae7c7486d4829419acad1d git | Not specified |
| CNA | Linux | Linux | affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 ee7bade8b9244834229b12b6e1e724939bedd484 git | Not specified |
| CNA | Linux | Linux | affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 5427dda195d6baf23028196fd55a0c90f66ffa61 git | Not specified |
| CNA | Linux | Linux | affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 ef9b3c22405192afaa279077ddd45a51db90b83d git | Not specified |
| CNA | Linux | Linux | affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 3d83d0b5ae5045a7a246ed116b5f6c688a12f9e9 git | Not specified |
| CNA | Linux | Linux | affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 c3d75524e10021aa5c223d94da4996640aed46c0 git | Not specified |
| CNA | Linux | Linux | affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 9f886d21e235c4bd038cb20f6696084304197ab3 git | Not specified |
| CNA | Linux | Linux | affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 7e40e0bb778907b2441bff68d73c3eb6b6cd319f git | Not specified |
| CNA | Linux | Linux | affected 3.14 | Not specified |
| CNA | Linux | Linux | unaffected 3.14 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.4.297 5.4.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.241 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.190 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.149 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.103 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.44 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.16.4 6.16.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.17 * original_commit_for_fix | Not specified |
| ADP | Siemens | SIMATIC CN 4100 | affected V5.0 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| lists.debian.org/debian-lts-announce/2025/10/msg00008.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | Mailing List, Third Party Advisory |
| git.kernel.org/stable/c/c35e7c7a004ef379a1ae7c7486d4829419acad1d | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/c3d75524e10021aa5c223d94da4996640aed46c0 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/3d83d0b5ae5045a7a246ed116b5f6c688a12f9e9 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/5427dda195d6baf23028196fd55a0c90f66ffa61 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/7e40e0bb778907b2441bff68d73c3eb6b6cd319f | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/ee7bade8b9244834229b12b6e1e724939bedd484 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/ef9b3c22405192afaa279077ddd45a51db90b83d | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| cert-portal.siemens.com/productcert/html/ssa-032379.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| git.kernel.org/stable/c/9f886d21e235c4bd038cb20f6696084304197ab3 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| lists.debian.org/debian-lts-announce/2025/10/msg00007.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.