We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-37870

drm/amd/display: prevent hang on link training fail



Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: prevent hang on link training fail [Why] When link training fails, the phy clock will be disabled. However, in enable_streams, it is assumed that link training succeeded and the mux selects the phy clock, causing a hang when a register write is made. [How] When enable_stream is hit, check if link training failed. If it did, fall back to the ref clock to avoid a hang and keep the system in a recoverable state.

Reserved 2025-04-16 | Published 2025-05-09 | Updated 2025-05-09 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 0363c03672cd3191f037905bf981eb523a3b71b1
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 04bf4f2a497e9877c425c5124652e61fb8a1a0aa
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8058061ed9d6bc259d1e678607b07d259342c08f
affected

Default status
affected

6.12.25
unaffected

6.14.4
unaffected

6.15-rc1
unaffected

References

git.kernel.org/...c/0363c03672cd3191f037905bf981eb523a3b71b1

git.kernel.org/...c/04bf4f2a497e9877c425c5124652e61fb8a1a0aa

git.kernel.org/...c/8058061ed9d6bc259d1e678607b07d259342c08f

cve.org (CVE-2025-37870)

nvd.nist.gov (CVE-2025-37870)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-37870

Support options

Helpdesk Chat, Email, Knowledgebase