-

CVE-2025-38467

In the Linux kernel, the following vulnerability has been resolved:

drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling

If there's support for another console device (such as a TTY serial),
the kernel occasionally panics during boot. The panic message and a
relevant snippet of the call stack is as follows:

  Unable to handle kernel NULL pointer dereference at virtual address 000000000000000
  Call trace:
    drm_crtc_handle_vblank+0x10/0x30 (P)
    decon_irq_handler+0x88/0xb4
    [...]

Otherwise, the panics don't happen. This indicates that it's some sort
of race condition.

Add a check to validate if the drm device can handle vblanks before
calling drm_crtc_handle_vblank() to avoid this.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7
Version 96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status affected
Version < a2130463fc9451005660b0eda7b61d5f746f7d74
Version 96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status affected
Version < 87825fbd1e176cd5b896940f3959e7c9a916945d
Version 96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status affected
Version < a40a35166f7e4f6dcd4b087d620c8228922dcb0a
Version 96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status affected
Version < 391e5ea5b877230b844c9bd8bbcd91b681b1ce2d
Version 96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status affected
Version < e9d9b25f376737b81f06de9c5aa422b488f47184
Version 96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status affected
Version < 996740652e620ef8ee1e5c65832cf2ffa498577d
Version 96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status affected
Version < b846350aa272de99bf6fecfa6b08e64ebfb13173
Version 96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.0
Status affected
Version < 4.0
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.296
Status unaffected
Version <= 5.10.*
Version 5.10.240
Status unaffected
Version <= 5.15.*
Version 5.15.189
Status unaffected
Version <= 6.1.*
Version 6.1.146
Status unaffected
Version <= 6.6.*
Version 6.6.99
Status unaffected
Version <= 6.12.*
Version 6.12.39
Status unaffected
Version <= 6.15.*
Version 6.15.7
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.103
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String