CVE-2024-57985: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: scm: Cleanup global '__scm' on probe failures If SCM driver fails the probe, it should not leave global '__scm' variable assigned, because external users of this driver will assume the probe finished successfully. For example TZMEM parts ('__scm->mempool') are initialized later in the probe, but users of it (__scm_smc_call()) rely on the '__scm' variable. This fixes theoretical NULL pointer exception, triggered via introducing probe deferral in SCM driver with call trace: qcom_tzmem_alloc+0x70/0x1ac (P) qcom_tzmem_alloc+0x64/0x1ac (L) qcom_scm_assign_mem+0x78/0x194 qcom_rmtfs_mem_probe+0x2d4/0x38c platform_probe+0x68/0xc8
AI Analysis
Technical Summary
CVE-2024-57985 is a vulnerability identified in the Linux kernel specifically related to the Qualcomm (qcom) SCM (Secure Channel Manager) driver. The issue arises when the SCM driver probe fails but does not properly clean up the global '__scm' variable. This variable is critical because external users of the driver rely on it to determine if the probe completed successfully. If the probe fails and '__scm' remains assigned, subsequent calls such as '__scm_smc_call()' may operate on uninitialized or invalid memory structures, particularly the TZMEM parts like '__scm->mempool'. This can lead to a NULL pointer dereference, causing kernel crashes or denial of service. The vulnerability is triggered by the introduction of probe deferral in the SCM driver, with a call trace involving functions like qcom_tzmem_alloc, qcom_scm_assign_mem, and qcom_rmtfs_mem_probe. Although this is described as a theoretical NULL pointer exception, it represents a stability and reliability risk in affected Linux kernel versions. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel commits identified by the hash 40289e35ca525f29a03989352ab207b6a9675475, indicating a narrow range of affected versions. The root cause is improper cleanup on probe failure, which is a common class of kernel driver bugs that can lead to unpredictable behavior and potential system crashes.
Potential Impact
For European organizations, the primary impact of CVE-2024-57985 is on system stability and availability. Systems running affected Linux kernel versions with Qualcomm SCM drivers could experience kernel panics or crashes if the driver probe fails and the global '__scm' variable is left in an inconsistent state. This could disrupt critical services, especially in environments relying on embedded Linux systems, telecommunications infrastructure, or IoT devices using Qualcomm chipsets. While the vulnerability does not directly expose confidentiality or integrity risks, denial of service conditions can affect operational continuity. Organizations with Linux-based infrastructure in sectors such as telecommunications, manufacturing, and critical infrastructure may face increased risk if they deploy affected kernel versions. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation or accidental system failures. Given the technical nature of the vulnerability, exploitation would likely require local access or specific conditions during driver initialization, limiting remote attack vectors but emphasizing the need for robust patch management and system monitoring.
Mitigation Recommendations
To mitigate CVE-2024-57985, European organizations should: 1) Identify and inventory Linux systems running affected kernel versions with Qualcomm SCM drivers, focusing on embedded and telecom devices. 2) Apply the official Linux kernel patches that address the cleanup of the '__scm' variable on probe failures as soon as they become available. 3) Implement rigorous kernel update policies to ensure timely deployment of security fixes, especially in production environments. 4) Monitor system logs for kernel probe failures or unusual behavior related to the SCM driver, enabling early detection of potential issues. 5) Where possible, conduct controlled testing of kernel updates in staging environments to verify stability before production rollout. 6) For devices where kernel updates are not feasible, consider vendor-specific firmware or driver updates that address this issue. 7) Limit local access to sensitive systems to reduce the risk of exploitation through local user actions. 8) Engage with hardware and software vendors to confirm support and patch availability for affected devices. These steps go beyond generic advice by emphasizing targeted identification of affected systems, proactive patch management, and operational monitoring specific to the Qualcomm SCM driver context.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland
CVE-2024-57985: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: scm: Cleanup global '__scm' on probe failures If SCM driver fails the probe, it should not leave global '__scm' variable assigned, because external users of this driver will assume the probe finished successfully. For example TZMEM parts ('__scm->mempool') are initialized later in the probe, but users of it (__scm_smc_call()) rely on the '__scm' variable. This fixes theoretical NULL pointer exception, triggered via introducing probe deferral in SCM driver with call trace: qcom_tzmem_alloc+0x70/0x1ac (P) qcom_tzmem_alloc+0x64/0x1ac (L) qcom_scm_assign_mem+0x78/0x194 qcom_rmtfs_mem_probe+0x2d4/0x38c platform_probe+0x68/0xc8
AI-Powered Analysis
Technical Analysis
CVE-2024-57985 is a vulnerability identified in the Linux kernel specifically related to the Qualcomm (qcom) SCM (Secure Channel Manager) driver. The issue arises when the SCM driver probe fails but does not properly clean up the global '__scm' variable. This variable is critical because external users of the driver rely on it to determine if the probe completed successfully. If the probe fails and '__scm' remains assigned, subsequent calls such as '__scm_smc_call()' may operate on uninitialized or invalid memory structures, particularly the TZMEM parts like '__scm->mempool'. This can lead to a NULL pointer dereference, causing kernel crashes or denial of service. The vulnerability is triggered by the introduction of probe deferral in the SCM driver, with a call trace involving functions like qcom_tzmem_alloc, qcom_scm_assign_mem, and qcom_rmtfs_mem_probe. Although this is described as a theoretical NULL pointer exception, it represents a stability and reliability risk in affected Linux kernel versions. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel commits identified by the hash 40289e35ca525f29a03989352ab207b6a9675475, indicating a narrow range of affected versions. The root cause is improper cleanup on probe failure, which is a common class of kernel driver bugs that can lead to unpredictable behavior and potential system crashes.
Potential Impact
For European organizations, the primary impact of CVE-2024-57985 is on system stability and availability. Systems running affected Linux kernel versions with Qualcomm SCM drivers could experience kernel panics or crashes if the driver probe fails and the global '__scm' variable is left in an inconsistent state. This could disrupt critical services, especially in environments relying on embedded Linux systems, telecommunications infrastructure, or IoT devices using Qualcomm chipsets. While the vulnerability does not directly expose confidentiality or integrity risks, denial of service conditions can affect operational continuity. Organizations with Linux-based infrastructure in sectors such as telecommunications, manufacturing, and critical infrastructure may face increased risk if they deploy affected kernel versions. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation or accidental system failures. Given the technical nature of the vulnerability, exploitation would likely require local access or specific conditions during driver initialization, limiting remote attack vectors but emphasizing the need for robust patch management and system monitoring.
Mitigation Recommendations
To mitigate CVE-2024-57985, European organizations should: 1) Identify and inventory Linux systems running affected kernel versions with Qualcomm SCM drivers, focusing on embedded and telecom devices. 2) Apply the official Linux kernel patches that address the cleanup of the '__scm' variable on probe failures as soon as they become available. 3) Implement rigorous kernel update policies to ensure timely deployment of security fixes, especially in production environments. 4) Monitor system logs for kernel probe failures or unusual behavior related to the SCM driver, enabling early detection of potential issues. 5) Where possible, conduct controlled testing of kernel updates in staging environments to verify stability before production rollout. 6) For devices where kernel updates are not feasible, consider vendor-specific firmware or driver updates that address this issue. 7) Limit local access to sensitive systems to reduce the risk of exploitation through local user actions. 8) Engage with hardware and software vendors to confirm support and patch availability for affected devices. These steps go beyond generic advice by emphasizing targeted identification of affected systems, proactive patch management, and operational monitoring specific to the Qualcomm SCM driver context.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-27T02:04:28.913Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9823c4522896dcbdebcf
Added to database: 5/21/2025, 9:08:51 AM
Last enriched: 6/28/2025, 9:40:03 AM
Last updated: 8/12/2025, 12:12:55 AM
Views: 13
Related Threats
CVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57702: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57701: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.