CVE-2025-38467
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
25/07/2025
Last modified:
22/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling<br />
<br />
If there&#39;s support for another console device (such as a TTY serial),<br />
the kernel occasionally panics during boot. The panic message and a<br />
relevant snippet of the call stack is as follows:<br />
<br />
Unable to handle kernel NULL pointer dereference at virtual address 000000000000000<br />
Call trace:<br />
drm_crtc_handle_vblank+0x10/0x30 (P)<br />
decon_irq_handler+0x88/0xb4<br />
[...]<br />
<br />
Otherwise, the panics don&#39;t happen. This indicates that it&#39;s some sort<br />
of race condition.<br />
<br />
Add a check to validate if the drm device can handle vblanks before<br />
calling drm_crtc_handle_vblank() to avoid this.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.0 (including) | 5.4.296 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.189 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.146 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.99 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d
- https://git.kernel.org/stable/c/87825fbd1e176cd5b896940f3959e7c9a916945d
- https://git.kernel.org/stable/c/996740652e620ef8ee1e5c65832cf2ffa498577d
- https://git.kernel.org/stable/c/a2130463fc9451005660b0eda7b61d5f746f7d74
- https://git.kernel.org/stable/c/a40a35166f7e4f6dcd4b087d620c8228922dcb0a
- https://git.kernel.org/stable/c/b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7
- https://git.kernel.org/stable/c/b846350aa272de99bf6fecfa6b08e64ebfb13173
- https://git.kernel.org/stable/c/e9d9b25f376737b81f06de9c5aa422b488f47184
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



