
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-57876 affects the Linux kernel's DisplayPort Multi-Stream Transport (MST) functionality. The vulnerability was discovered and disclosed on January 11, 2025, specifically in the drm/dp_mst component. The issue involves a race condition in the message reception state handling during MST topology removal (NVD).
The vulnerability occurs when the MST topology is removed during the reception of an MST down reply or MST up request sideband message. The drmdpmsttopologymgr::upreqrecv/downreprecv states could be reset from one thread via drmdpmsttopologymgrsetmst(false), while racing with the reading/parsing of the message from another thread via drmdpmsthandledownrep() or drmdpmsthandleupreq(). This race condition is possible because the reader/parser doesn't hold any lock while accessing the reception state, potentially leading to memory corruption (Kernel Commit).
The vulnerability can lead to memory corruption in the reader/parser component of the Linux kernel's DisplayPort MST handling system, potentially affecting system stability and security (Kernel Commit).
The issue has been fixed by implementing a new mechanism to reset the message reception state before reading/parsing a message. The fix introduces a resetrxstate flag and associated handling to ensure proper synchronization. The patch has been incorporated into various Linux kernel versions, including 6.1.x series (Debian Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."