Skip to main content

CVE-2024-57852: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-57852cvecve-2024-57852
Published: Thu Feb 27 2025 (02/27/2025, 02:18:09 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: scm: smc: Handle missing SCM device Commit ca61d6836e6f ("firmware: qcom: scm: fix a NULL-pointer dereference") makes it explicit that qcom_scm_get_tzmem_pool() can return NULL, therefore its users should handle this.

AI-Powered Analysis

AILast updated: 06/28/2025, 08:25:40 UTC

Technical Analysis

CVE-2024-57852 is a vulnerability identified in the Linux kernel related to the Qualcomm (qcom) Secure Channel Manager (SCM) firmware interface. Specifically, the issue arises from improper handling of a NULL-pointer dereference in the function qcom_scm_get_tzmem_pool(). The vulnerability was addressed by commit ca61d6836e6f, which explicitly acknowledges that qcom_scm_get_tzmem_pool() can return NULL, and mandates that all users of this function must properly handle this case to avoid dereferencing a NULL pointer. This flaw could lead to kernel crashes or denial of service conditions if the SCM device is missing or the function returns NULL and the kernel code does not check for this condition before dereferencing the pointer. The vulnerability is rooted in the firmware interface layer for Qualcomm hardware within the Linux kernel, which is commonly used in embedded devices, mobile devices, and some specialized computing environments. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability does not appear to allow privilege escalation or arbitrary code execution directly but can impact system stability and availability by causing kernel panics or crashes due to NULL-pointer dereferences. The affected versions are identified by a specific commit hash, indicating the vulnerability is present in certain Linux kernel builds prior to the fix. The issue is technical and specific to the handling of the SCM device in Qualcomm-based Linux systems, requiring kernel-level patching to remediate.

Potential Impact

For European organizations, the primary impact of CVE-2024-57852 lies in potential system instability and availability issues on devices running vulnerable Linux kernels with Qualcomm SCM firmware interfaces. This includes embedded systems, IoT devices, mobile devices, and potentially network infrastructure equipment that rely on Qualcomm chipsets and Linux. Organizations in sectors such as telecommunications, manufacturing, automotive, and critical infrastructure that deploy such devices could experience service disruptions or downtime if the vulnerability is triggered. Although the vulnerability does not currently have known exploits in the wild and does not directly enable data breaches or privilege escalation, the denial of service impact could affect operational continuity, especially in environments where high availability is critical. The lack of a CVSS score and no known exploitation suggests a lower immediate risk, but the vulnerability should be addressed promptly to avoid potential future exploitation or accidental system crashes. European organizations with large-scale deployments of Qualcomm-based Linux systems should prioritize patching to maintain system reliability and prevent disruptions.

Mitigation Recommendations

To mitigate CVE-2024-57852, European organizations should: 1) Identify all Linux systems using Qualcomm SCM firmware interfaces, especially embedded and mobile devices running affected kernel versions. 2) Apply the kernel patch that includes commit ca61d6836e6f or upgrade to a Linux kernel version that incorporates this fix. 3) For devices where kernel upgrades are not immediately feasible, implement monitoring to detect kernel panics or crashes related to SCM device handling to enable rapid incident response. 4) Coordinate with device vendors and OEMs to ensure firmware and kernel updates are provided and deployed in a timely manner. 5) Conduct thorough testing of patched kernels in staging environments to verify stability before production deployment, given the kernel-level nature of the fix. 6) Maintain an inventory of Qualcomm-based Linux devices and track firmware/kernel versions to ensure ongoing compliance with security updates. These steps go beyond generic advice by focusing on device identification, vendor coordination, and operational monitoring tailored to the specific nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-27T02:16:34.091Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde8eb

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 8:25:40 AM

Last updated: 7/26/2025, 1:12:40 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats