CVE-2024-57876

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
11/01/2025
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/dp_mst: Fix resetting msg rx state after topology removal<br /> <br /> If the MST topology is removed during the reception of an MST down reply<br /> or MST up request sideband message, the<br /> drm_dp_mst_topology_mgr::up_req_recv/down_rep_recv states could be reset<br /> from one thread via drm_dp_mst_topology_mgr_set_mst(false), racing with<br /> the reading/parsing of the message from another thread via<br /> drm_dp_mst_handle_down_rep() or drm_dp_mst_handle_up_req(). The race is<br /> possible since the reader/parser doesn&amp;#39;t hold any lock while accessing<br /> the reception state. This in turn can lead to a memory corruption in the<br /> reader/parser as described by commit bd2fccac61b4 ("drm/dp_mst: Fix MST<br /> sideband message body length check").<br /> <br /> Fix the above by resetting the message reception state if needed before<br /> reading/parsing a message. Another solution would be to hold the<br /> drm_dp_mst_topology_mgr::lock for the whole duration of the message<br /> reception/parsing in drm_dp_mst_handle_down_rep() and<br /> drm_dp_mst_handle_up_req(), however this would require a bigger change.<br /> Since the fix is also needed for stable, opting for the simpler solution<br /> in this patch.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10.173 (including) 5.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.100 (including) 5.16 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.18 (including) 6.1.120 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2.5 (including) 6.6.66 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.5 (excluding)
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*