In the Linux kernel, the following vulnerability has been resolved:
drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling
If there's support for another console device (such as a TTY serial),
the kernel occasionally panics during boot. The panic message and a
relevant snippet of the call stack is as follows:
Unable to handle kernel NULL pointer dereference at virtual address 000000000000000
Call trace:
drm_crtc_handle_vblank+0x10/0x30 (P)
decon_irq_handler+0x88/0xb4
[...]
Otherwise, the panics don't happen. This indicates that it's some sort
of race condition.
Add a check to validate if the drm device can handle vblanks before
calling drm_crtc_handle_vblank() to avoid this.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Dec 2025, 19:36
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-476 | |
| References | () https://git.kernel.org/stable/c/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d - Patch | |
| References | () https://git.kernel.org/stable/c/87825fbd1e176cd5b896940f3959e7c9a916945d - Patch | |
| References | () https://git.kernel.org/stable/c/996740652e620ef8ee1e5c65832cf2ffa498577d - Patch | |
| References | () https://git.kernel.org/stable/c/a2130463fc9451005660b0eda7b61d5f746f7d74 - Patch | |
| References | () https://git.kernel.org/stable/c/a40a35166f7e4f6dcd4b087d620c8228922dcb0a - Patch | |
| References | () https://git.kernel.org/stable/c/b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7 - Patch | |
| References | () https://git.kernel.org/stable/c/b846350aa272de99bf6fecfa6b08e64ebfb13173 - Patch | |
| References | () https://git.kernel.org/stable/c/e9d9b25f376737b81f06de9c5aa422b488f47184 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
29 Jul 2025, 14:14
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
25 Jul 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-25 16:15
Updated : 2025-12-22 19:36
NVD link : CVE-2025-38467
Mitre link : CVE-2025-38467
CVE.ORG link : CVE-2025-38467
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
