Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2024-57985 First vendor Publication 2025-02-27
Vendor Cve Last vendor Modification 2025-02-27

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

firmware: qcom: scm: Cleanup global '__scm' on probe failures

If SCM driver fails the probe, it should not leave global '__scm' variable assigned, because external users of this driver will assume the probe finished successfully. For example TZMEM parts ('__scm->mempool') are initialized later in the probe, but users of it (__scm_smc_call()) rely on the '__scm' variable.

This fixes theoretical NULL pointer exception, triggered via introducing probe deferral in SCM driver with call trace:

qcom_tzmem_alloc+0x70/0x1ac (P)
qcom_tzmem_alloc+0x64/0x1ac (L)
qcom_scm_assign_mem+0x78/0x194
qcom_rmtfs_mem_probe+0x2d4/0x38c
platform_probe+0x68/0xc8

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57985

Sources (Detail)

https://git.kernel.org/stable/c/1e76b546e6fca7eb568161f408133904ca6bcf4f
https://git.kernel.org/stable/c/390d3baeba51a126f75c97b90ec28b9384ce4b84
https://git.kernel.org/stable/c/faf1715798fe72b79e4432ce8c6d03ca69765425
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-02-27 09:20:32
  • First insertion