๐Ÿ” CVE Alert

CVE-2024-57798

HIGH 7.8

drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() While receiving an MST up request message from one thread in drm_dp_mst_handle_up_req(), the MST topology could be removed from another thread via drm_dp_mst_topology_mgr_set_mst(false), freeing mst_primary and setting drm_dp_mst_topology_mgr::mst_primary to NULL. This could lead to a NULL deref/use-after-free of mst_primary in drm_dp_mst_handle_up_req(). Avoid the above by holding a reference for mst_primary in drm_dp_mst_handle_up_req() while it's used. v2: Fix kfreeing the request if getting an mst_primary reference fails.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 11, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
9408cc94eb041d0c2f9f00189a613b94c0449450 < f61b2e5e7821f868d6afc22382a66a30ee780ba0 9408cc94eb041d0c2f9f00189a613b94c0449450 < 9735d40f5fde9970aa46e828ecc85c32571d58a2 9408cc94eb041d0c2f9f00189a613b94c0449450 < ce55818b2d3a999f886af91679589e4644ff1dc8 9408cc94eb041d0c2f9f00189a613b94c0449450 < e54b00086f7473dbda1a7d6fc47720ced157c6a8
Linux / Linux
5.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f61b2e5e7821f868d6afc22382a66a30ee780ba0 git.kernel.org: https://git.kernel.org/stable/c/9735d40f5fde9970aa46e828ecc85c32571d58a2 git.kernel.org: https://git.kernel.org/stable/c/ce55818b2d3a999f886af91679589e4644ff1dc8 git.kernel.org: https://git.kernel.org/stable/c/e54b00086f7473dbda1a7d6fc47720ced157c6a8 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html