CVE-2024-57876

Source
https://cve.org/CVERecord?id=CVE-2024-57876
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57876.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-57876
Downstream
Related
Published
2025-01-11T14:49:02.550Z
Modified
2026-03-11T07:53:33.956287Z
Summary
drm/dp_mst: Fix resetting msg rx state after topology removal
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/dp_mst: Fix resetting msg rx state after topology removal

If the MST topology is removed during the reception of an MST down reply or MST up request sideband message, the drmdpmsttopologymgr::upreqrecv/downreprecv states could be reset from one thread via drmdpmsttopologymgrsetmst(false), racing with the reading/parsing of the message from another thread via drmdpmsthandledownrep() or drmdpmsthandleupreq(). The race is possible since the reader/parser doesn't hold any lock while accessing the reception state. This in turn can lead to a memory corruption in the reader/parser as described by commit bd2fccac61b4 ("drm/dp_mst: Fix MST sideband message body length check").

Fix the above by resetting the message reception state if needed before reading/parsing a message. Another solution would be to hold the drmdpmsttopologymgr::lock for the whole duration of the message reception/parsing in drmdpmsthandledownrep() and drmdpmsthandleupreq(), however this would require a bigger change. Since the fix is also needed for stable, opting for the simpler solution in this patch.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57876.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b30fcedeba643ca16eaa6212c1245598b7cd830d
Fixed
94b33b2d7640e807869451384eb88321dd0ffbd4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1d082618bbf3b6755b8cc68c0a8122af2842d593
Fixed
d834d20d2e86c52ed5cab41763fa61e6071680ef
Fixed
be826b4451fd187a7c0b04be4f8243d5df6e0450
Fixed
a6fa67d26de385c3c7a23c1e109a0e23bfda4ec7
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
ee4a4282d78d96e07e714c28ca54679713fa2157
Last affected
db35e49413a4d03ea0c003598803e49956f59324
Last affected
a579ed4613b5a64074963988ad481e43cf3b917b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57876.json"