{"id":"CVE-2025-21941","summary":"drm/amd/display: Fix null check for pipe_ctx-\u003eplane_state in resource_build_scaling_params","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix null check for pipe_ctx-\u003eplane_state in resource_build_scaling_params\n\nNull pointer dereference issue could occur when pipe_ctx-\u003eplane_state\nis null. The fix adds a check to ensure 'pipe_ctx-\u003eplane_state' is not\nnull before accessing. This prevents a null pointer dereference.\n\nFound by code review.\n\n(cherry picked from commit 63e6a77ccf239337baa9b1e7787cde9fa0462092)","modified":"2026-04-02T12:45:17.253940Z","published":"2025-04-01T15:41:06.489Z","related":["SUSE-SU-2025:01600-1","SUSE-SU-2025:01614-1","SUSE-SU-2025:01707-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01964-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20206-1","SUSE-SU-2025:20270-1","SUSE-SU-2025:20283-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21941.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/265422915416468ba91bffa56addbff45e18342a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3748fad09d89e9a5290e1738fd6872a79f794743"},{"type":"WEB","url":"https://git.kernel.org/stable/c/374c9faac5a763a05bc3f68ad9f73dab3c6aec90"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3b3c2be58d5275aa59d8b4810a59f173f2f5bac1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c1e54752dc12e90305eb0475ca908f42f5b369ca"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e0345c3478f185ca840daac7f08a1fcd4ebec3e9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f435192e00bc4d5d4134356b93212670ec47fa8d"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21941.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21941"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3be5262e353b8ab97c528bfc7d0dd3c820e4ba27"},{"fixed":"265422915416468ba91bffa56addbff45e18342a"},{"fixed":"f435192e00bc4d5d4134356b93212670ec47fa8d"},{"fixed":"c1e54752dc12e90305eb0475ca908f42f5b369ca"},{"fixed":"3b3c2be58d5275aa59d8b4810a59f173f2f5bac1"},{"fixed":"e0345c3478f185ca840daac7f08a1fcd4ebec3e9"},{"fixed":"3748fad09d89e9a5290e1738fd6872a79f794743"},{"fixed":"374c9faac5a763a05bc3f68ad9f73dab3c6aec90"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21941.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}