Skip to main content

CVE-2024-50159: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50159cvecve-2024-50159
Published: Thu Nov 07 2024 (11/07/2024, 09:31:36 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() Clang static checker(scan-build) throws below warning: | drivers/firmware/arm_scmi/driver.c:line 2915, column 2 | Attempt to free released memory. When devm_add_action_or_reset() fails, scmi_debugfs_common_cleanup() will run twice which causes double free of 'dbg->name'. Remove the redundant scmi_debugfs_common_cleanup() to fix this problem.

AI-Powered Analysis

AILast updated: 06/28/2025, 17:56:28 UTC

Technical Analysis

CVE-2024-50159 is a vulnerability identified in the Linux kernel specifically within the firmware subsystem related to the ARM System Control and Management Interface (SCMI) driver. The issue arises in the function scmi_debugfs_common_setup(), where a double free of memory occurs due to improper handling of error conditions. More precisely, when the function devm_add_action_or_reset() fails, the cleanup function scmi_debugfs_common_cleanup() is invoked twice, leading to a double free of the memory allocated for 'dbg->name'. This double free vulnerability is a classic memory management flaw that can lead to undefined behavior, including potential kernel crashes or exploitation opportunities such as use-after-free or heap corruption. The root cause is a redundant call to the cleanup function, which was removed in the patch to resolve the issue. The vulnerability was detected through static analysis using Clang's scan-build tool, which flagged the attempt to free already released memory. The affected code is part of the Linux kernel's ARM firmware driver, which is critical for managing firmware communication on ARM-based platforms. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability was published on November 7, 2024, and affects specific Linux kernel commits identified by their hashes. The fix involves removing the redundant cleanup call to prevent the double free condition.

Potential Impact

For European organizations, the impact of CVE-2024-50159 depends largely on their use of ARM-based Linux systems, particularly those running custom or embedded Linux kernels with the affected firmware drivers. The vulnerability could lead to kernel instability or crashes, potentially causing denial of service (DoS) conditions on critical systems. More severe exploitation could allow attackers with local access to execute arbitrary code in kernel mode, compromising system confidentiality, integrity, and availability. This is especially relevant for industries relying on ARM-based infrastructure such as telecommunications, IoT deployments, automotive systems, and edge computing devices prevalent in Europe. Given the kernel-level nature of the flaw, successful exploitation could undermine the security of entire systems, leading to data breaches or disruption of services. However, the lack of known exploits and the requirement for local code execution or privileged access reduce the immediate risk. Nonetheless, organizations should prioritize patching to prevent potential future exploitation, especially in sectors with high security requirements such as finance, healthcare, and critical infrastructure.

Mitigation Recommendations

European organizations should apply the Linux kernel patch that removes the redundant scmi_debugfs_common_cleanup() call as soon as it becomes available from their Linux distribution vendors or kernel maintainers. Since this vulnerability affects the ARM SCMI firmware driver, organizations using ARM-based Linux systems should audit their kernel versions and update to a fixed version. For embedded or custom Linux deployments, recompiling the kernel with the patch is essential. Additionally, organizations should implement strict access controls to limit local user privileges, reducing the risk of exploitation by unprivileged users. Employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), and enabling security modules like SELinux or AppArmor can further mitigate exploitation risks. Monitoring system logs for kernel crashes or unusual behavior related to firmware drivers can help detect potential exploitation attempts. Finally, maintaining an up-to-date inventory of ARM-based Linux devices and ensuring timely patch management will reduce exposure to this and similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.961Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe011f

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 5:56:28 PM

Last updated: 7/26/2025, 5:22:04 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats