CVE-2024-40920
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-40920 affects the Linux kernel's network bridge MST (Multiple Spanning Tree) implementation. The vulnerability was discovered in July 2024 and involves a suspicious RCU (Read-Copy-Update) usage in the brmstset_state function. The issue stems from an incomplete fix for a VLAN use-after-free vulnerability, where the VLAN group dereference helper was not properly updated to use RCU-safe access methods (Kernel Git).

Technical details

The vulnerability exists in the net/bridge/brmst.c file where the brmstsetstate function was using nbpvlangroup() instead of the RCU-safe nbpvlangroup_rcu() helper function. This incorrect usage could lead to potential race conditions when accessing VLAN group data structures under RCU read lock (Kernel Git).

Impact

The vulnerability could potentially lead to race conditions in the Linux kernel's network bridge implementation when handling VLAN groups, which might affect system stability and network operations (Ubuntu Security).

Mitigation and workarounds

The issue has been fixed in various Linux kernel versions through patches that properly implement RCU-safe access methods. Ubuntu has released fixes in version 6.8.0-44.44 for Ubuntu 24.04 LTS and other affected versions (Ubuntu Security). Users are advised to update their kernel to the patched versions.

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-devel
NoYesDec 09, 2025
CVE-2025-40343N/AN/A
  • Linux KernelLinux Kernel
  • bpftool
NoYesDec 09, 2025
CVE-2025-40342N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-trace
NoYesDec 09, 2025
CVE-2025-40341N/AN/A
  • Linux KernelLinux Kernel
  • kernel-headers
NoYesDec 09, 2025
CVE-2025-40340N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-modules-extra
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management