{"id":"CVE-2025-21747","summary":"drm/ast: astdp: Fix timeout for enabling video signal","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ast: astdp: Fix timeout for enabling video signal\n\nThe ASTDP transmitter sometimes takes up to 1 second for enabling the\nvideo signal, while the timeout is only 200 msec. This results in a\nkernel error message. Increase the timeout to 1 second. An example\nof the error message is shown below.\n\n[  697.084433] ------------[ cut here ]------------\n[  697.091115] ast 0000:02:00.0: [drm] drm_WARN_ON(!__ast_dp_wait_enable(ast, enabled))\n[  697.091233] WARNING: CPU: 1 PID: 160 at drivers/gpu/drm/ast/ast_dp.c:232 ast_dp_set_enable+0x123/0x140 [ast]\n[...]\n[  697.272469] RIP: 0010:ast_dp_set_enable+0x123/0x140 [ast]\n[...]\n[  697.415283] Call Trace:\n[  697.420727]  \u003cTASK\u003e\n[  697.425908]  ? show_trace_log_lvl+0x196/0x2c0\n[  697.433304]  ? show_trace_log_lvl+0x196/0x2c0\n[  697.440693]  ? drm_atomic_helper_commit_modeset_enables+0x30a/0x470\n[  697.450115]  ? ast_dp_set_enable+0x123/0x140 [ast]\n[  697.458059]  ? __warn.cold+0xaf/0xca\n[  697.464713]  ? ast_dp_set_enable+0x123/0x140 [ast]\n[  697.472633]  ? report_bug+0x134/0x1d0\n[  697.479544]  ? handle_bug+0x58/0x90\n[  697.486127]  ? exc_invalid_op+0x13/0x40\n[  697.492975]  ? asm_exc_invalid_op+0x16/0x20\n[  697.500224]  ? preempt_count_sub+0x14/0xc0\n[  697.507473]  ? ast_dp_set_enable+0x123/0x140 [ast]\n[  697.515377]  ? ast_dp_set_enable+0x123/0x140 [ast]\n[  697.523227]  drm_atomic_helper_commit_modeset_enables+0x30a/0x470\n[  697.532388]  drm_atomic_helper_commit_tail+0x58/0x90\n[  697.540400]  ast_mode_config_helper_atomic_commit_tail+0x30/0x40 [ast]\n[  697.550009]  commit_tail+0xfe/0x1d0\n[  697.556547]  drm_atomic_helper_commit+0x198/0x1c0\n\nThis is a cosmetical problem. Enabling the video signal still works\neven with the error message. The problem has always been present, but\nonly recent versions of the ast driver warn about missing the timeout.","modified":"2026-04-02T12:45:12.385930Z","published":"2025-02-27T02:12:19.088Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21747.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/589839379031cce220c9cab9f27cb5477195067e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fd39c41bcd82d5ebaaebadb944eab5598c668a90"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21747.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21747"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4e29cc7c5c673299cfbaf4982fc8b6a72c9f706f"},{"fixed":"589839379031cce220c9cab9f27cb5477195067e"},{"fixed":"fd39c41bcd82d5ebaaebadb944eab5598c668a90"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21747.json"}}],"schema_version":"1.7.5"}