{"id":"CVE-2025-39709","summary":"media: venus: protect against spurious interrupts during probe","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: venus: protect against spurious interrupts during probe\n\nMake sure the interrupt handler is initialized before the interrupt is\nregistered.\n\nIf the IRQ is registered before hfi_create(), it's possible that an\ninterrupt fires before the handler setup is complete, leading to a NULL\ndereference.\n\nThis error condition has been observed during system boot on Rb3Gen2.","aliases":["ECHO-d31e-d060-fcbe"],"modified":"2026-04-21T02:27:04.601329700Z","published":"2025-09-05T17:21:16.153Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39709.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/18c2b2bd982b8546312c9a7895515672169f28e0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3200144a2fa4209dc084a19941b9b203b43580f0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/37cc0ac889b018097c217c5929fd6dc2aed636a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/639eb587f977c02423f4762467055b23902b4131"},{"type":"WEB","url":"https://git.kernel.org/stable/c/88cf63c2599761c48dec8f618d57dccf8f6f4b53"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9db6a78bc5e418e0064e2248c8f3b9b9e8418646"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e796028b4835af00d9a38ebbb208ec3a6634702a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f54be97bc69b1096198b6717c150dec69f2a1b4d"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39709.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39709"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"af2c3834c8ca7cc65d15592ac671933df8848115"},{"fixed":"18c2b2bd982b8546312c9a7895515672169f28e0"},{"fixed":"88cf63c2599761c48dec8f618d57dccf8f6f4b53"},{"fixed":"9db6a78bc5e418e0064e2248c8f3b9b9e8418646"},{"fixed":"37cc0ac889b018097c217c5929fd6dc2aed636a1"},{"fixed":"f54be97bc69b1096198b6717c150dec69f2a1b4d"},{"fixed":"639eb587f977c02423f4762467055b23902b4131"},{"fixed":"e796028b4835af00d9a38ebbb208ec3a6634702a"},{"fixed":"3200144a2fa4209dc084a19941b9b203b43580f0"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39709.json"}}],"schema_version":"1.7.5"}