Memory Corruption Risk in Linux Kernel due to MST Topology Management
CVE-2024-57876
Currently unrated
Summary
A race condition in the Linux kernel's handling of MST topology messages could lead to memory corruption. Specifically, during the removal of the MST topology, concurrent access and modification of message reception states without proper locking mechanisms could compromise the integrity of the data being parsed. The vulnerability is addressed by resetting the message reception state before reading or parsing messages, ensuring stable operation and preventing the potential for data corruption.
Affected Version(s)
Linux b30fcedeba643ca16eaa6212c1245598b7cd830d < 94b33b2d7640e807869451384eb88321dd0ffbd4
Linux 1d082618bbf3b6755b8cc68c0a8122af2842d593
Linux 1d082618bbf3b6755b8cc68c0a8122af2842d593
References
Timeline
Vulnerability published
Vulnerability Reserved