In the Linux kernel, the following vulnerability has been resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s support for another console device (such as a TTY serial),the kernel occasionally panics during boot. The panic message and arelevant snippet of the call stack is as follows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, the panics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
In the Linux kernel, the following vulnerability has been resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s support for another console device (such as a TTY serial),the kernel occasionally panics during boot. The panic message and arelevant snippet of the call stack is as follows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, the panics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
In the Linux kernel, the following vulnerability has been resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s support for another console device (such as a TTY serial),the kernel occasionally panics during boot. The panic message and arelevant snippet of the call stack is as follows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, the panics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
In the Linux kernel, the following vulnerability has been resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s support for another console device (such as a TTY serial),the kernel occasionally panics during boot. The panic message and arelevant snippet of the call stack is as follows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, the panics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
In the Linux kernel, the following vulnerability hasbeen resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s supportfor anotherconsole device(such as a TTY serial),the kernel occasionally panics during boot. Thepanic message and arelevantsnippet of the call stackis asfollows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, thepanics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
A vulnerability has been found in Linux Kernel up to6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerabilityis CWE-476.A NULL pointerdereference occurs when the application dereferences a pointer that itexpects to be valid, but isNULL, typically causing acrashor exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patchb4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to 6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patch b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to 6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patch b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to 6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patch b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to 6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patch b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerabilityis CWE-476.A NULL pointerdereference occurs when the application dereferences a pointer that itexpects to be valid, but isNULL, typically causing acrashor exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patchb4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability hasbeen resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s supportfor anotherconsole device(such as a TTY serial),the kernel occasionally panics during boot. Thepanic message and arelevantsnippet of the call stackis asfollows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, thepanics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
In the Linux kernel, the following vulnerability hasbeen resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s supportfor anotherconsole device(such as a TTY serial),the kernel occasionally panics during boot. Thepanic message and arelevantsnippet of the call stackis asfollows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, thepanics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
A vulnerability has been found in Linux Kernel up to6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerabilityis CWE-476.A NULL pointerdereference occurs when the application dereferences a pointer that itexpects to be valid, but isNULL, typically causing acrashor exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patchb4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerabilityis CWE-476.A NULL pointerdereference occurs when the application dereferences a pointer that itexpects to be valid, but isNULL, typically causing acrashor exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patchb4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability hasbeen resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s supportfor anotherconsole device(such as a TTY serial),the kernel occasionally panics during boot. Thepanic message and arelevantsnippet of the call stackis asfollows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, thepanics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
In the Linux kernel, the following vulnerability hasbeen resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s supportfor anotherconsole device(such as a TTY serial),the kernel occasionally panics during boot. Thepanic message and arelevantsnippet of the call stackis asfollows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, thepanics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
A vulnerability has been found in Linux Kernel up to6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerabilityis CWE-476.A NULL pointerdereference occurs when the application dereferences a pointer that itexpects to be valid, but isNULL, typically causing acrashor exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patchb4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerabilityis CWE-476.A NULL pointerdereference occurs when the application dereferences a pointer that itexpects to be valid, but isNULL, typically causing acrashor exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patchb4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability hasbeen resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s supportfor anotherconsole device(such as a TTY serial),the kernel occasionally panics during boot. Thepanic message and arelevantsnippet of the call stackis asfollows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, thepanics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
In the Linux kernel, the following vulnerability hasbeen resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s supportfor anotherconsole device(such as a TTY serial),the kernel occasionally panics during boot. Thepanic message and arelevantsnippet of the call stackis asfollows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, thepanics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
A vulnerability has been found in Linux Kernel up to6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerabilityis CWE-476.A NULL pointerdereference occurs when the application dereferences a pointer that itexpects to be valid, but isNULL, typically causing acrashor exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patchb4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerabilityis CWE-476.A NULL pointerdereference occurs when the application dereferences a pointer that itexpects to be valid, but isNULL, typically causing acrashor exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patchb4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability hasbeen resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s supportfor anotherconsole device(such as a TTY serial),the kernel occasionally panics during boot. Thepanic message and arelevantsnippet of the call stackis asfollows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, thepanics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
In the Linux kernel, the following vulnerability hasbeen resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s supportfor anotherconsole device(such as a TTY serial),the kernel occasionally panics during boot. Thepanic message and arelevantsnippet of the call stackis asfollows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, thepanics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
A vulnerability has been found in Linux Kernel up to6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerabilityis CWE-476.A NULL pointerdereference occurs when the application dereferences a pointer that itexpects to be valid, but isNULL, typically causing acrashor exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patchb4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerabilityis CWE-476.A NULL pointerdereference occurs when the application dereferences a pointer that itexpects to be valid, but isNULL, typically causing acrashor exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patchb4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability hasbeen resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s supportfor anotherconsole device(such as a TTY serial),the kernel occasionally panics during boot. Thepanic message and arelevantsnippet of the call stackis asfollows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, thepanics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
In the Linux kernel, the following vulnerability hasbeen resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there s supportfor anotherconsole device(such as a TTY serial),the kernel occasionally panics during boot. Thepanic message and arelevantsnippet of the call stackis asfollows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, thepanics don t happen. This indicates that it s some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.
A vulnerability has been found in Linux Kernel up to6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerabilityis CWE-476.A NULL pointerdereference occurs when the application dereferences a pointer that itexpects to be valid, but isNULL, typically causing acrashor exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patchb4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to 6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patch b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to 6.16-rc4 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc5 eliminates this vulnerability. Applying the patch b4e72c0bf878f02faa00a7dc7c9ffc4ff7c116a7/a2130463fc9451005660b0eda7b61d5f746f7d74/87825fbd1e176cd5b896940f3959e7c9a916945d/a40a35166f7e4f6dcd4b087d620c8228922dcb0a/391e5ea5b877230b844c9bd8bbcd91b681b1ce2d/e9d9b25f376737b81f06de9c5aa422b488f47184/996740652e620ef8ee1e5c65832cf2ffa498577d/b846350aa272de99bf6fecfa6b08e64ebfb13173 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability has been resolved:drm/exynos: exynos7_drm_decon: add vblank check in IRQ handlingIf there's support for another console device (such as a TTY serial),the kernel occasionally panics during boot. The panic message and arelevant snippet of the call stack is as follows: Unable to handle kernel NULL pointer dereference at virtual address 000000000000000 Call trace: drm_crtc_handle_vblank+0x10/0x30 (P) decon_irq_handler+0x88/0xb4 [...]Otherwise, the panics don't happen. This indicates that it's some sortof race condition.Add a check to validate if the drm device can handle vblanks beforecalling drm_crtc_handle_vblank() to avoid this.The Linux kernel CVE team has assigned CVE-2025-38467 to this issue.