{"id":"CVE-2021-47641","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: cirrusfb: check pixclock to avoid divide by zero\n\nDo a sanity check on pixclock value to avoid divide by zero.\n\nIf the pixclock value is zero, the cirrusfb driver will round up\npixclock to get the derived frequency as close to maxclock as\npossible.\n\nSyzkaller reported a divide error in cirrusfb_check_pixclock.\n\ndivide error: 0000 [#1] SMP KASAN PTI\nCPU: 0 PID: 14938 Comm: cirrusfb_test Not tainted 5.15.0-rc6 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2\nRIP: 0010:cirrusfb_check_var+0x6f1/0x1260\n\nCall Trace:\n fb_set_var+0x398/0xf90\n do_fb_ioctl+0x4b8/0x6f0\n fb_ioctl+0xeb/0x130\n __x64_sys_ioctl+0x19d/0x220\n do_syscall_64+0x3a/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae","modified":"2026-03-13T05:18:12.448683Z","published":"2025-02-26T06:37:05.883Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/40b13e3d85744210db13457785646634e2d056bd"},{"type":"FIX","url":"https://git.kernel.org/stable/c/45800c42ef000f417270bcfc08630e42486fca99"},{"type":"FIX","url":"https://git.kernel.org/stable/c/8c7e2141fb89c620ab4e41512e262fbf25b8260d"},{"type":"FIX","url":"https://git.kernel.org/stable/c/c656d04247a2654ede5cead2ecbf83431dad5261"},{"type":"FIX","url":"https://git.kernel.org/stable/c/1d3fb46439ad4e8f0c5739eb33d1875ac9e0f135"},{"type":"FIX","url":"https://git.kernel.org/stable/c/53a2088a396cfa1da92690a1da289634cd73bf0d"},{"type":"FIX","url":"https://git.kernel.org/stable/c/5c6f402bdcf9e7239c6bc7087eda71ac99b31379"},{"type":"FIX","url":"https://git.kernel.org/stable/c/6fe23ff94e7840097202e85c148688940b37c9b1"},{"type":"FIX","url":"https://git.kernel.org/stable/c/e498b504f8c81b07efab9febf8503448de4dc9cf"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47641.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.311"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.276"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.238"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.189"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.110"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.33"}]},{"events":[{"introduced":"5.16"},{"fixed":"5.16.19"}]},{"events":[{"introduced":"5.17"},{"fixed":"5.17.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}