Bug 1227784 (CVE-2024-40921)

Summary: VUL-0: CVE-2024-40921: kernel: net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Michal Kubeček <mkubecek>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: camila.matos, miroslav.franc, mkubecek
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/413848/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-40921:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on: 1226604    
Bug Blocks:    

Description SMASH SMASH 2024-07-15 11:26:23 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state

Pass the already obtained vlan group pointer to br_mst_vlan_set_state()
instead of dereferencing it again. Each caller has already correctly
dereferenced it for their context. This change is required for the
following suspicious RCU dereference fix. No functional changes
intended.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-40921
https://www.cve.org/CVERecord?id=CVE-2024-40921
https://git.kernel.org/stable/c/09f4337c27f5bdeb8646a6db91488cc2f7d537ff
https://git.kernel.org/stable/c/36c92936e868601fa1f43da6758cf55805043509
https://git.kernel.org/stable/c/a6cc9e9a651b9861efa068c164ee62dfba68c6ca
https://git.kernel.org/stable/c/d2dc02775fc0c4eacaee833a0637e5958884a8e5
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-40921.mbox