๐Ÿ” CVE Alert

CVE-2025-21956

UNKNOWN 0.0

drm/amd/display: Assign normalized_pix_clk when color depth = 14

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Assign normalized_pix_clk when color depth = 14 [WHY & HOW] A warning message "WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397 calculate_phy_pix_clks+0xef/0x100 [amdgpu]" occurs because the display_color_depth == COLOR_DEPTH_141414 is not handled. This is observed in Radeon RX 6600 XT. It is fixed by assigning pix_clk * (14 * 3) / 24 - same as the rests. Also fixes the indentation in get_norm_pix_clk. (cherry picked from commit 274a87eb389f58eddcbc5659ab0b180b37e92775)

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < cca3ab74f90176099b6392e8e894b52b27b3d080 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 0174a2e5770efee9dbd4b58963ed4d939298ff5e 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 0c0016712e5dc23ce4a7e673cbebc24a535d8c8a 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < dc831b38680c47d07e425871a9852109183895cf 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < a8f77e1658d78e4a8bb227a83bcee67de97f7634 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 04f90b505ad3a6eed474bbaa03167095fef5203a 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 27df30106690969f7d63604f0d49ed8e9bffa2cb 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 79e31396fdd7037c503e6add15af7cb00633ea92
Linux / Linux
4.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/cca3ab74f90176099b6392e8e894b52b27b3d080 git.kernel.org: https://git.kernel.org/stable/c/0174a2e5770efee9dbd4b58963ed4d939298ff5e git.kernel.org: https://git.kernel.org/stable/c/0c0016712e5dc23ce4a7e673cbebc24a535d8c8a git.kernel.org: https://git.kernel.org/stable/c/dc831b38680c47d07e425871a9852109183895cf git.kernel.org: https://git.kernel.org/stable/c/a8f77e1658d78e4a8bb227a83bcee67de97f7634 git.kernel.org: https://git.kernel.org/stable/c/04f90b505ad3a6eed474bbaa03167095fef5203a git.kernel.org: https://git.kernel.org/stable/c/27df30106690969f7d63604f0d49ed8e9bffa2cb git.kernel.org: https://git.kernel.org/stable/c/79e31396fdd7037c503e6add15af7cb00633ea92 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html