U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-39714 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: media: usbtv: Lock resolution while streaming When an program is streaming (ffplay) and another program (qv4l2) changes the TV standard from NTSC to PAL, the kernel crashes due to trying to copy to unmapped memory. Changing from NTSC to PAL increases the resolution in the usbtv struct, but the video plane buffer isn't adjusted, so it overflows. [hverkuil: call vb2_is_busy instead of vb2_is_streaming]


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/3d83d0b5ae5045a7a246ed116b5f6c688a12f9e9 kernel.org
https://git.kernel.org/stable/c/5427dda195d6baf23028196fd55a0c90f66ffa61 kernel.org
https://git.kernel.org/stable/c/7e40e0bb778907b2441bff68d73c3eb6b6cd319f kernel.org
https://git.kernel.org/stable/c/9f886d21e235c4bd038cb20f6696084304197ab3 kernel.org
https://git.kernel.org/stable/c/c35e7c7a004ef379a1ae7c7486d4829419acad1d kernel.org
https://git.kernel.org/stable/c/c3d75524e10021aa5c223d94da4996640aed46c0 kernel.org
https://git.kernel.org/stable/c/ee7bade8b9244834229b12b6e1e724939bedd484 kernel.org
https://git.kernel.org/stable/c/ef9b3c22405192afaa279077ddd45a51db90b83d kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-39714
NVD Published Date:
09/05/2025
NVD Last Modified:
09/05/2025
Source:
kernel.org