{"api_version":"1","generated_at":"2026-05-13T19:41:22+00:00","cve":"CVE-2025-39714","urls":{"html":"https://cve.report/CVE-2025-39714","api":"https://cve.report/api/cve/CVE-2025-39714.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-39714","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-39714"},"summary":{"title":"media: usbtv: Lock resolution while streaming","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: usbtv: Lock resolution while streaming\n\nWhen an program is streaming (ffplay) and another program (qv4l2)\nchanges the TV standard from NTSC to PAL, the kernel crashes due to trying\nto copy to unmapped memory.\n\nChanging from NTSC to PAL increases the resolution in the usbtv struct,\nbut the video plane buffer isn't adjusted, so it overflows.\n\n[hverkuil: call vb2_is_busy instead of vb2_is_streaming]","state":"PUBLISHED","assigner":"Linux","published_at":"2025-09-05 18:15:48","updated_at":"2026-05-12 13:17:07"},"problem_types":["NVD-CWE-noinfo"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"5.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html","name":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/c35e7c7a004ef379a1ae7c7486d4829419acad1d","name":"https://git.kernel.org/stable/c/c35e7c7a004ef379a1ae7c7486d4829419acad1d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/c3d75524e10021aa5c223d94da4996640aed46c0","name":"https://git.kernel.org/stable/c/c3d75524e10021aa5c223d94da4996640aed46c0","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/3d83d0b5ae5045a7a246ed116b5f6c688a12f9e9","name":"https://git.kernel.org/stable/c/3d83d0b5ae5045a7a246ed116b5f6c688a12f9e9","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/5427dda195d6baf23028196fd55a0c90f66ffa61","name":"https://git.kernel.org/stable/c/5427dda195d6baf23028196fd55a0c90f66ffa61","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/7e40e0bb778907b2441bff68d73c3eb6b6cd319f","name":"https://git.kernel.org/stable/c/7e40e0bb778907b2441bff68d73c3eb6b6cd319f","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/ee7bade8b9244834229b12b6e1e724939bedd484","name":"https://git.kernel.org/stable/c/ee7bade8b9244834229b12b6e1e724939bedd484","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/ef9b3c22405192afaa279077ddd45a51db90b83d","name":"https://git.kernel.org/stable/c/ef9b3c22405192afaa279077ddd45a51db90b83d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-032379.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-032379.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/9f886d21e235c4bd038cb20f6696084304197ab3","name":"https://git.kernel.org/stable/c/9f886d21e235c4bd038cb20f6696084304197ab3","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html","name":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-39714","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39714","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 c35e7c7a004ef379a1ae7c7486d4829419acad1d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 ee7bade8b9244834229b12b6e1e724939bedd484 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 5427dda195d6baf23028196fd55a0c90f66ffa61 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 ef9b3c22405192afaa279077ddd45a51db90b83d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 3d83d0b5ae5045a7a246ed116b5f6c688a12f9e9 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 c3d75524e10021aa5c223d94da4996640aed46c0 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 9f886d21e235c4bd038cb20f6696084304197ab3 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0e0fe3958fdd13dbf55c3a787acafde6efd04272 7e40e0bb778907b2441bff68d73c3eb6b6cd319f git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 3.14","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 3.14 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.4.297 5.4.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.10.241 5.10.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.190 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.149 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.103 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.44 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.16.4 6.16.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.17 * original_commit_for_fix","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIMATIC CN 4100","version":"affected V5.0 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2025","cve_id":"39714","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2025-11-03T17:42:41.101Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"}],"title":"CVE Program Container"},{"affected":[{"defaultStatus":"unknown","product":"SIMATIC CN 4100","vendor":"Siemens","versions":[{"lessThan":"V5.0","status":"affected","version":"0","versionType":"custom"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T12:06:31.361Z","orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP"},"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-032379.html"}],"x_adpType":"supplier"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/media/usb/usbtv/usbtv-video.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"c35e7c7a004ef379a1ae7c7486d4829419acad1d","status":"affected","version":"0e0fe3958fdd13dbf55c3a787acafde6efd04272","versionType":"git"},{"lessThan":"ee7bade8b9244834229b12b6e1e724939bedd484","status":"affected","version":"0e0fe3958fdd13dbf55c3a787acafde6efd04272","versionType":"git"},{"lessThan":"5427dda195d6baf23028196fd55a0c90f66ffa61","status":"affected","version":"0e0fe3958fdd13dbf55c3a787acafde6efd04272","versionType":"git"},{"lessThan":"ef9b3c22405192afaa279077ddd45a51db90b83d","status":"affected","version":"0e0fe3958fdd13dbf55c3a787acafde6efd04272","versionType":"git"},{"lessThan":"3d83d0b5ae5045a7a246ed116b5f6c688a12f9e9","status":"affected","version":"0e0fe3958fdd13dbf55c3a787acafde6efd04272","versionType":"git"},{"lessThan":"c3d75524e10021aa5c223d94da4996640aed46c0","status":"affected","version":"0e0fe3958fdd13dbf55c3a787acafde6efd04272","versionType":"git"},{"lessThan":"9f886d21e235c4bd038cb20f6696084304197ab3","status":"affected","version":"0e0fe3958fdd13dbf55c3a787acafde6efd04272","versionType":"git"},{"lessThan":"7e40e0bb778907b2441bff68d73c3eb6b6cd319f","status":"affected","version":"0e0fe3958fdd13dbf55c3a787acafde6efd04272","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/media/usb/usbtv/usbtv-video.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"3.14"},{"lessThan":"3.14","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"5.4.*","status":"unaffected","version":"5.4.297","versionType":"semver"},{"lessThanOrEqual":"5.10.*","status":"unaffected","version":"5.10.241","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.190","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.149","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.103","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.44","versionType":"semver"},{"lessThanOrEqual":"6.16.*","status":"unaffected","version":"6.16.4","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"6.17","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.4.297","versionStartIncluding":"3.14","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.10.241","versionStartIncluding":"3.14","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.190","versionStartIncluding":"3.14","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.149","versionStartIncluding":"3.14","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.103","versionStartIncluding":"3.14","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.44","versionStartIncluding":"3.14","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.16.4","versionStartIncluding":"3.14","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.17","versionStartIncluding":"3.14","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: usbtv: Lock resolution while streaming\n\nWhen an program is streaming (ffplay) and another program (qv4l2)\nchanges the TV standard from NTSC to PAL, the kernel crashes due to trying\nto copy to unmapped memory.\n\nChanging from NTSC to PAL increases the resolution in the usbtv struct,\nbut the video plane buffer isn't adjusted, so it overflows.\n\n[hverkuil: call vb2_is_busy instead of vb2_is_streaming]"}],"providerMetadata":{"dateUpdated":"2026-05-11T21:34:50.505Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/c35e7c7a004ef379a1ae7c7486d4829419acad1d"},{"url":"https://git.kernel.org/stable/c/ee7bade8b9244834229b12b6e1e724939bedd484"},{"url":"https://git.kernel.org/stable/c/5427dda195d6baf23028196fd55a0c90f66ffa61"},{"url":"https://git.kernel.org/stable/c/ef9b3c22405192afaa279077ddd45a51db90b83d"},{"url":"https://git.kernel.org/stable/c/3d83d0b5ae5045a7a246ed116b5f6c688a12f9e9"},{"url":"https://git.kernel.org/stable/c/c3d75524e10021aa5c223d94da4996640aed46c0"},{"url":"https://git.kernel.org/stable/c/9f886d21e235c4bd038cb20f6696084304197ab3"},{"url":"https://git.kernel.org/stable/c/7e40e0bb778907b2441bff68d73c3eb6b6cd319f"}],"title":"media: usbtv: Lock resolution while streaming","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2025-39714","datePublished":"2025-09-05T17:21:21.435Z","dateReserved":"2025-04-16T07:20:57.117Z","dateUpdated":"2026-05-12T12:06:31.361Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2025-09-05 18:15:48","lastModifiedDate":"2026-05-12 13:17:07","problem_types":["NVD-CWE-noinfo"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.14","versionEndExcluding":"5.4.297","matchCriteriaId":"70083655-66F5-4925-B3B5-21D2434F71E5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.241","matchCriteriaId":"D0D21C35-EB8A-488A-BBF9-403E4817E5DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.190","matchCriteriaId":"AD9E597F-3DDE-4D7E-976C-463D0611F13F"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.149","matchCriteriaId":"FDBE8280-8983-4D2D-943D-2E6D0104E2D8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.6.103","matchCriteriaId":"F2293654-7169-49B5-8D0D-EE51EF8B8E48"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.12.44","matchCriteriaId":"12351F24-1133-4775-960C-F2B47E81298B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.16.4","matchCriteriaId":"AFC28995-B8C3-4B68-8CB6-78E792B6629D"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","matchCriteriaId":"FA6FEEC2-9F11-4643-8827-749718254FED"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"39714","Ordinal":"1","Title":"media: usbtv: Lock resolution while streaming","CVE":"CVE-2025-39714","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"39714","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: usbtv: Lock resolution while streaming\n\nWhen an program is streaming (ffplay) and another program (qv4l2)\nchanges the TV standard from NTSC to PAL, the kernel crashes due to trying\nto copy to unmapped memory.\n\nChanging from NTSC to PAL increases the resolution in the usbtv struct,\nbut the video plane buffer isn't adjusted, so it overflows.\n\n[hverkuil: call vb2_is_busy instead of vb2_is_streaming]","Type":"Description","Title":"media: usbtv: Lock resolution while streaming"}]}}}