CVE-2025-39820NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 94.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add a null ptr check for dpu_encoder_needs_modeset The drm_atomic_get_new_connector_state() can return NULL if the connector is not part of the atomic state. Add a check to prevent a NULL pointer dereference. This follows the same pattern used in dpu_encoder_update_topology() within the same file, which checks for NULL before using conn_state. Patchwork: https://patchwork.freedesktop.org/patch/665188/

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.156.16.5+1
Debianlinux/linux_kernel< 6.16.5-1
CVEListV5linux/linux1ce69c265a53c61c5c29f97f542ff89af3f3d7e7aaec54254b02f5959c3670177037464d828b2140+2
debiandebian/linux< linux 6.16.5-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-2xr3-2r6g-cgx8: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add a null ptr check for dpu_encoder_needs_modeset The drm_atomic_g2025-09-16
OSV
CVE-2025-39820: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add a null ptr check for dpu_encoder_needs_modeset The drm_atomic_get2025-09-16

📋Vendor Advisories

2
Red Hat
kernel: drm/msm/dpu: Add a null ptr check for dpu_encoder_needs_modeset2025-09-16
Debian
CVE-2025-39820: linux - In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu...2025
CVE-2025-39820 — NULL Pointer Dereference in Linux | cvebase