CVE-2024-57876
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
11/01/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/dp_mst: Fix resetting msg rx state after topology removal<br />
<br />
If the MST topology is removed during the reception of an MST down reply<br />
or MST up request sideband message, the<br />
drm_dp_mst_topology_mgr::up_req_recv/down_rep_recv states could be reset<br />
from one thread via drm_dp_mst_topology_mgr_set_mst(false), racing with<br />
the reading/parsing of the message from another thread via<br />
drm_dp_mst_handle_down_rep() or drm_dp_mst_handle_up_req(). The race is<br />
possible since the reader/parser doesn&#39;t hold any lock while accessing<br />
the reception state. This in turn can lead to a memory corruption in the<br />
reader/parser as described by commit bd2fccac61b4 ("drm/dp_mst: Fix MST<br />
sideband message body length check").<br />
<br />
Fix the above by resetting the message reception state if needed before<br />
reading/parsing a message. Another solution would be to hold the<br />
drm_dp_mst_topology_mgr::lock for the whole duration of the message<br />
reception/parsing in drm_dp_mst_handle_down_rep() and<br />
drm_dp_mst_handle_up_req(), however this would require a bigger change.<br />
Since the fix is also needed for stable, opting for the simpler solution<br />
in this patch.
Impact
Base Score 3.x
7.00
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.173 (including) | 5.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.100 (including) | 5.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.18 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2.5 (including) | 6.6.66 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/94b33b2d7640e807869451384eb88321dd0ffbd4
- https://git.kernel.org/stable/c/a6fa67d26de385c3c7a23c1e109a0e23bfda4ec7
- https://git.kernel.org/stable/c/be826b4451fd187a7c0b04be4f8243d5df6e0450
- https://git.kernel.org/stable/c/d834d20d2e86c52ed5cab41763fa61e6071680ef
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



