CVE-2025-34449

NameCVE-2025-34449
DescriptionGenymobile/scrcpy versions up to and including 3.3.3, prior to commit 3e40b24, contain a buffer overflow vulnerability in the sc_device_msg_deserialize() function. A compromised device can send crafted messages that cause out-of-bounds reads, which may result in memory corruption or a denial-of-service condition. This vulnerability may allow further exploitation on the host system.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
scrcpy (PTS)bullseye1.17-1fixed
sid1.25-1.1fixed
sid/contrib3.3.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
scrcpysource(unstable)(not affected)

Notes

- scrcpy <not-affected> (Vulnerable code introduced later)
https://github.com/Genymobile/scrcpy/issues/6415
Introduced with: https://github.com/Genymobile/scrcpy/commit/87da68ee0d74831a2b44230c573a3b315c8fd7d3 (v2.4)
Fixed by: https://github.com/Genymobile/scrcpy/commit/3e40b2473772cea3a23d4932088fd0bc4cc0f52c (v3.3.4)

Search for package or bug name: Reporting problems