GHSA-2Q85-CV3G-7MXP
Vulnerability from github – Published: 2025-02-27 03:34 – Updated: 2025-10-28 21:30In the Linux kernel, the following vulnerability has been resolved:
drm/ast: astdp: Fix timeout for enabling video signal
The ASTDP transmitter sometimes takes up to 1 second for enabling the video signal, while the timeout is only 200 msec. This results in a kernel error message. Increase the timeout to 1 second. An example of the error message is shown below.
[ 697.084433] ------------[ cut here ]------------ [ 697.091115] ast 0000:02:00.0: [drm] drm_WARN_ON(!__ast_dp_wait_enable(ast, enabled)) [ 697.091233] WARNING: CPU: 1 PID: 160 at drivers/gpu/drm/ast/ast_dp.c:232 ast_dp_set_enable+0x123/0x140 [ast] [...] [ 697.272469] RIP: 0010:ast_dp_set_enable+0x123/0x140 [ast] [...] [ 697.415283] Call Trace: [ 697.420727] [ 697.425908] ? show_trace_log_lvl+0x196/0x2c0 [ 697.433304] ? show_trace_log_lvl+0x196/0x2c0 [ 697.440693] ? drm_atomic_helper_commit_modeset_enables+0x30a/0x470 [ 697.450115] ? ast_dp_set_enable+0x123/0x140 [ast] [ 697.458059] ? __warn.cold+0xaf/0xca [ 697.464713] ? ast_dp_set_enable+0x123/0x140 [ast] [ 697.472633] ? report_bug+0x134/0x1d0 [ 697.479544] ? handle_bug+0x58/0x90 [ 697.486127] ? exc_invalid_op+0x13/0x40 [ 697.492975] ? asm_exc_invalid_op+0x16/0x20 [ 697.500224] ? preempt_count_sub+0x14/0xc0 [ 697.507473] ? ast_dp_set_enable+0x123/0x140 [ast] [ 697.515377] ? ast_dp_set_enable+0x123/0x140 [ast] [ 697.523227] drm_atomic_helper_commit_modeset_enables+0x30a/0x470 [ 697.532388] drm_atomic_helper_commit_tail+0x58/0x90 [ 697.540400] ast_mode_config_helper_atomic_commit_tail+0x30/0x40 [ast] [ 697.550009] commit_tail+0xfe/0x1d0 [ 697.556547] drm_atomic_helper_commit+0x198/0x1c0
This is a cosmetical problem. Enabling the video signal still works even with the error message. The problem has always been present, but only recent versions of the ast driver warn about missing the timeout.
{
"affected": [],
"aliases": [
"CVE-2025-21747"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-02-27T03:15:15Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ast: astdp: Fix timeout for enabling video signal\n\nThe ASTDP transmitter sometimes takes up to 1 second for enabling the\nvideo signal, while the timeout is only 200 msec. This results in a\nkernel error message. Increase the timeout to 1 second. An example\nof the error message is shown below.\n\n[ 697.084433] ------------[ cut here ]------------\n[ 697.091115] ast 0000:02:00.0: [drm] drm_WARN_ON(!__ast_dp_wait_enable(ast, enabled))\n[ 697.091233] WARNING: CPU: 1 PID: 160 at drivers/gpu/drm/ast/ast_dp.c:232 ast_dp_set_enable+0x123/0x140 [ast]\n[...]\n[ 697.272469] RIP: 0010:ast_dp_set_enable+0x123/0x140 [ast]\n[...]\n[ 697.415283] Call Trace:\n[ 697.420727] \u003cTASK\u003e\n[ 697.425908] ? show_trace_log_lvl+0x196/0x2c0\n[ 697.433304] ? show_trace_log_lvl+0x196/0x2c0\n[ 697.440693] ? drm_atomic_helper_commit_modeset_enables+0x30a/0x470\n[ 697.450115] ? ast_dp_set_enable+0x123/0x140 [ast]\n[ 697.458059] ? __warn.cold+0xaf/0xca\n[ 697.464713] ? ast_dp_set_enable+0x123/0x140 [ast]\n[ 697.472633] ? report_bug+0x134/0x1d0\n[ 697.479544] ? handle_bug+0x58/0x90\n[ 697.486127] ? exc_invalid_op+0x13/0x40\n[ 697.492975] ? asm_exc_invalid_op+0x16/0x20\n[ 697.500224] ? preempt_count_sub+0x14/0xc0\n[ 697.507473] ? ast_dp_set_enable+0x123/0x140 [ast]\n[ 697.515377] ? ast_dp_set_enable+0x123/0x140 [ast]\n[ 697.523227] drm_atomic_helper_commit_modeset_enables+0x30a/0x470\n[ 697.532388] drm_atomic_helper_commit_tail+0x58/0x90\n[ 697.540400] ast_mode_config_helper_atomic_commit_tail+0x30/0x40 [ast]\n[ 697.550009] commit_tail+0xfe/0x1d0\n[ 697.556547] drm_atomic_helper_commit+0x198/0x1c0\n\nThis is a cosmetical problem. Enabling the video signal still works\neven with the error message. The problem has always been present, but\nonly recent versions of the ast driver warn about missing the timeout.",
"id": "GHSA-2q85-cv3g-7mxp",
"modified": "2025-10-28T21:30:27Z",
"published": "2025-02-27T03:34:04Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21747"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/589839379031cce220c9cab9f27cb5477195067e"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/fd39c41bcd82d5ebaaebadb944eab5598c668a90"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.