-
CVE-2025-38467
- EPSS 0.04%
- Veröffentlicht 25.07.2025 16:15:33
- Zuletzt bearbeitet 29.07.2025 14:14:55
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling If there's support for another console device (such as a TTY serial), the kernel occasionally panics during boot. The panic message and a relevant snippet of the call stack is as follows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...] Otherwise, the panics don't happen. This indicates that it's some sort of race condition. Add a check to validate if the drm device can handle vblanks before calling drm_crtc_handle_vblank() to avoid this.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7
Version
96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status
affected
Version <
a2130463fc9451005660b0eda7b61d5f746f7d74
Version
96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status
affected
Version <
87825fbd1e176cd5b896940f3959e7c9a916945d
Version
96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status
affected
Version <
a40a35166f7e4f6dcd4b087d620c8228922dcb0a
Version
96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status
affected
Version <
391e5ea5b877230b844c9bd8bbcd91b681b1ce2d
Version
96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status
affected
Version <
e9d9b25f376737b81f06de9c5aa422b488f47184
Version
96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status
affected
Version <
996740652e620ef8ee1e5c65832cf2ffa498577d
Version
96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status
affected
Version <
b846350aa272de99bf6fecfa6b08e64ebfb13173
Version
96976c3d9aff4e1387c30f6356ac01fa6f72ef46
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.0
Status
affected
Version <
4.0
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.296
Status
unaffected
Version <=
5.10.*
Version
5.10.240
Status
unaffected
Version <=
5.15.*
Version
5.15.189
Status
unaffected
Version <=
6.1.*
Version
6.1.146
Status
unaffected
Version <=
6.6.*
Version
6.6.99
Status
unaffected
Version <=
6.12.*
Version
6.12.39
Status
unaffected
Version <=
6.15.*
Version
6.15.7
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.103 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|