CVE-2025-39709

In the Linux kernel, the following vulnerability has been resolved: media: venus: protect against spurious interrupts during probe Make sure the interrupt handler is initialized before the interrupt is registered. If the IRQ is registered before hfi_create(), it's possible that an interrupt fires before the handler setup is complete, leading to a NULL dereference. This error condition has been observed during system boot on Rb3Gen2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

08 Jan 2026, 16:19

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/18c2b2bd982b8546312c9a7895515672169f28e0 - () https://git.kernel.org/stable/c/18c2b2bd982b8546312c9a7895515672169f28e0 - Patch
References () https://git.kernel.org/stable/c/3200144a2fa4209dc084a19941b9b203b43580f0 - () https://git.kernel.org/stable/c/3200144a2fa4209dc084a19941b9b203b43580f0 - Patch
References () https://git.kernel.org/stable/c/37cc0ac889b018097c217c5929fd6dc2aed636a1 - () https://git.kernel.org/stable/c/37cc0ac889b018097c217c5929fd6dc2aed636a1 - Patch
References () https://git.kernel.org/stable/c/639eb587f977c02423f4762467055b23902b4131 - () https://git.kernel.org/stable/c/639eb587f977c02423f4762467055b23902b4131 - Patch
References () https://git.kernel.org/stable/c/88cf63c2599761c48dec8f618d57dccf8f6f4b53 - () https://git.kernel.org/stable/c/88cf63c2599761c48dec8f618d57dccf8f6f4b53 - Patch
References () https://git.kernel.org/stable/c/9db6a78bc5e418e0064e2248c8f3b9b9e8418646 - () https://git.kernel.org/stable/c/9db6a78bc5e418e0064e2248c8f3b9b9e8418646 - Patch
References () https://git.kernel.org/stable/c/e796028b4835af00d9a38ebbb208ec3a6634702a - () https://git.kernel.org/stable/c/e796028b4835af00d9a38ebbb208ec3a6634702a - Patch
References () https://git.kernel.org/stable/c/f54be97bc69b1096198b6717c150dec69f2a1b4d - () https://git.kernel.org/stable/c/f54be97bc69b1096198b6717c150dec69f2a1b4d - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-476
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

05 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-05 18:15

Updated : 2026-01-08 16:19


NVD link : CVE-2025-39709

Mitre link : CVE-2025-39709

CVE.ORG link : CVE-2025-39709


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference