Memory Corruption Risk in Linux Kernel due to MST Topology Management
CVE-2024-57876

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
11 January 2025

Summary

A race condition in the Linux kernel's handling of MST topology messages could lead to memory corruption. Specifically, during the removal of the MST topology, concurrent access and modification of message reception states without proper locking mechanisms could compromise the integrity of the data being parsed. The vulnerability is addressed by resetting the message reception state before reading or parsing messages, ensuring stable operation and preventing the potential for data corruption.

Affected Version(s)

Linux b30fcedeba643ca16eaa6212c1245598b7cd830d < 94b33b2d7640e807869451384eb88321dd0ffbd4

Linux 1d082618bbf3b6755b8cc68c0a8122af2842d593

Linux 1d082618bbf3b6755b8cc68c0a8122af2842d593

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.