Skip to main content

CVE-2024-57985: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-57985cvecve-2024-57985
Published: Thu Feb 27 2025 (02/27/2025, 02:07:09 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: scm: Cleanup global '__scm' on probe failures If SCM driver fails the probe, it should not leave global '__scm' variable assigned, because external users of this driver will assume the probe finished successfully. For example TZMEM parts ('__scm->mempool') are initialized later in the probe, but users of it (__scm_smc_call()) rely on the '__scm' variable. This fixes theoretical NULL pointer exception, triggered via introducing probe deferral in SCM driver with call trace: qcom_tzmem_alloc+0x70/0x1ac (P) qcom_tzmem_alloc+0x64/0x1ac (L) qcom_scm_assign_mem+0x78/0x194 qcom_rmtfs_mem_probe+0x2d4/0x38c platform_probe+0x68/0xc8

AI-Powered Analysis

AILast updated: 06/28/2025, 09:40:03 UTC

Technical Analysis

CVE-2024-57985 is a vulnerability identified in the Linux kernel specifically related to the Qualcomm (qcom) SCM (Secure Channel Manager) driver. The issue arises when the SCM driver probe fails but does not properly clean up the global '__scm' variable. This variable is critical because external users of the driver rely on it to determine if the probe completed successfully. If the probe fails and '__scm' remains assigned, subsequent calls such as '__scm_smc_call()' may operate on uninitialized or invalid memory structures, particularly the TZMEM parts like '__scm->mempool'. This can lead to a NULL pointer dereference, causing kernel crashes or denial of service. The vulnerability is triggered by the introduction of probe deferral in the SCM driver, with a call trace involving functions like qcom_tzmem_alloc, qcom_scm_assign_mem, and qcom_rmtfs_mem_probe. Although this is described as a theoretical NULL pointer exception, it represents a stability and reliability risk in affected Linux kernel versions. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel commits identified by the hash 40289e35ca525f29a03989352ab207b6a9675475, indicating a narrow range of affected versions. The root cause is improper cleanup on probe failure, which is a common class of kernel driver bugs that can lead to unpredictable behavior and potential system crashes.

Potential Impact

For European organizations, the primary impact of CVE-2024-57985 is on system stability and availability. Systems running affected Linux kernel versions with Qualcomm SCM drivers could experience kernel panics or crashes if the driver probe fails and the global '__scm' variable is left in an inconsistent state. This could disrupt critical services, especially in environments relying on embedded Linux systems, telecommunications infrastructure, or IoT devices using Qualcomm chipsets. While the vulnerability does not directly expose confidentiality or integrity risks, denial of service conditions can affect operational continuity. Organizations with Linux-based infrastructure in sectors such as telecommunications, manufacturing, and critical infrastructure may face increased risk if they deploy affected kernel versions. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation or accidental system failures. Given the technical nature of the vulnerability, exploitation would likely require local access or specific conditions during driver initialization, limiting remote attack vectors but emphasizing the need for robust patch management and system monitoring.

Mitigation Recommendations

To mitigate CVE-2024-57985, European organizations should: 1) Identify and inventory Linux systems running affected kernel versions with Qualcomm SCM drivers, focusing on embedded and telecom devices. 2) Apply the official Linux kernel patches that address the cleanup of the '__scm' variable on probe failures as soon as they become available. 3) Implement rigorous kernel update policies to ensure timely deployment of security fixes, especially in production environments. 4) Monitor system logs for kernel probe failures or unusual behavior related to the SCM driver, enabling early detection of potential issues. 5) Where possible, conduct controlled testing of kernel updates in staging environments to verify stability before production rollout. 6) For devices where kernel updates are not feasible, consider vendor-specific firmware or driver updates that address this issue. 7) Limit local access to sensitive systems to reduce the risk of exploitation through local user actions. 8) Engage with hardware and software vendors to confirm support and patch availability for affected devices. These steps go beyond generic advice by emphasizing targeted identification of affected systems, proactive patch management, and operational monitoring specific to the Qualcomm SCM driver context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-27T02:04:28.913Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdebcf

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 9:40:03 AM

Last updated: 8/12/2025, 12:12:55 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats