๐Ÿ” CVE Alert

CVE-2025-38467

UNKNOWN 0.0

drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling If there's support for another console device (such as a TTY serial), the kernel occasionally panics during boot. The panic message and a relevant snippet of the call stack is as follows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...] Otherwise, the panics don't happen. This indicates that it's some sort of race condition. Add a check to validate if the drm device can handle vblanks before calling drm_crtc_handle_vblank() to avoid this.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 25, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
96976c3d9aff4e1387c30f6356ac01fa6f72ef46 < b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7 96976c3d9aff4e1387c30f6356ac01fa6f72ef46 < a2130463fc9451005660b0eda7b61d5f746f7d74 96976c3d9aff4e1387c30f6356ac01fa6f72ef46 < 87825fbd1e176cd5b896940f3959e7c9a916945d 96976c3d9aff4e1387c30f6356ac01fa6f72ef46 < a40a35166f7e4f6dcd4b087d620c8228922dcb0a 96976c3d9aff4e1387c30f6356ac01fa6f72ef46 < 391e5ea5b877230b844c9bd8bbcd91b681b1ce2d 96976c3d9aff4e1387c30f6356ac01fa6f72ef46 < e9d9b25f376737b81f06de9c5aa422b488f47184 96976c3d9aff4e1387c30f6356ac01fa6f72ef46 < 996740652e620ef8ee1e5c65832cf2ffa498577d 96976c3d9aff4e1387c30f6356ac01fa6f72ef46 < b846350aa272de99bf6fecfa6b08e64ebfb13173
Linux / Linux
4.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7 git.kernel.org: https://git.kernel.org/stable/c/a2130463fc9451005660b0eda7b61d5f746f7d74 git.kernel.org: https://git.kernel.org/stable/c/87825fbd1e176cd5b896940f3959e7c9a916945d git.kernel.org: https://git.kernel.org/stable/c/a40a35166f7e4f6dcd4b087d620c8228922dcb0a git.kernel.org: https://git.kernel.org/stable/c/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d git.kernel.org: https://git.kernel.org/stable/c/e9d9b25f376737b81f06de9c5aa422b488f47184 git.kernel.org: https://git.kernel.org/stable/c/996740652e620ef8ee1e5c65832cf2ffa498577d git.kernel.org: https://git.kernel.org/stable/c/b846350aa272de99bf6fecfa6b08e64ebfb13173 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html