{"uuid": "167d0635-c5b2-4bdc-b405-ed97f01fe09e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57798", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1299", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57798\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()\n\nWhile receiving an MST up request message from one thread in\ndrm_dp_mst_handle_up_req(), the MST topology could be removed from\nanother thread via drm_dp_mst_topology_mgr_set_mst(false), freeing\nmst_primary and setting drm_dp_mst_topology_mgr::mst_primary to NULL.\nThis could lead to a NULL deref/use-after-free of mst_primary in\ndrm_dp_mst_handle_up_req().\n\nAvoid the above by holding a reference for mst_primary in\ndrm_dp_mst_handle_up_req() while it's used.\n\nv2: Fix kfreeing the request if getting an mst_primary reference fails.\n\ud83d\udccf Published: 2025-01-11T12:39:48.212Z\n\ud83d\udccf Modified: 2025-01-11T12:39:48.212Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f61b2e5e7821f868d6afc22382a66a30ee780ba0\n2. https://git.kernel.org/stable/c/9735d40f5fde9970aa46e828ecc85c32571d58a2\n3. https://git.kernel.org/stable/c/ce55818b2d3a999f886af91679589e4644ff1dc8\n4. https://git.kernel.org/stable/c/e54b00086f7473dbda1a7d6fc47720ced157c6a8", "creation_timestamp": "2025-01-11T13:05:57.000000Z"}