{"uuid": "bf06b853-f2cc-454f-a837-6c762b59c347", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38240", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12403", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-38240\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: dp: drm_err =&gt; dev_err in HPD path to avoid NULL ptr\n\nThe function mtk_dp_wait_hpd_asserted() may be called before the\n`mtk_dp-&gt;drm_dev` pointer is assigned in mtk_dp_bridge_attach().\nSpecifically it can be called via this callpath:\n - mtk_edp_wait_hpd_asserted\n - [panel probe]\n - dp_aux_ep_probe\n\nUsing \"drm\" level prints anywhere in this callpath causes a NULL\npointer dereference. Change the error message directly in\nmtk_dp_wait_hpd_asserted() to dev_err() to avoid this. Also change the\nerror messages in mtk_dp_parse_capabilities(), which is called by\nmtk_dp_wait_hpd_asserted().\n\nWhile touching these prints, also add the error code to them to make\nfuture debugging easier.\n\ud83d\udccf Published: 2025-04-18T07:01:32.338Z\n\ud83d\udccf Modified: 2025-04-18T07:01:32.338Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/13ec849fd2eab808ee8eba2625df7ebea3b85edf\n2. https://git.kernel.org/stable/c/57a9fb47551b33cde7b76d17c0072c3b394f4620\n3. https://git.kernel.org/stable/c/2fda391ef7a701748abd7fa32232981b522c1e07\n4. https://git.kernel.org/stable/c/149a5c38436c229950cf1020992ce65c9549bc19\n5. https://git.kernel.org/stable/c/106a6de46cf4887d535018185ec528ce822d6d84", "creation_timestamp": "2025-04-18T07:59:16.000000Z"}