In the Linux kernel, the following vulnerability has been resolved:
firmware: qcom: scm: smc: Handle missing SCM device
Commit ca61d6836e6f ("firmware: qcom: scm: fix a NULL-pointer dereference") makes it explicit that qcomscmgettzmempool() can return NULL, therefore its users should handle this.
[
{
"id": "CVE-2024-57852-1ed497ec",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57a811c0886f3f3677bb4619502b35b5bb917f2e",
"signature_version": "v1",
"target": {
"function": "__scm_smc_call",
"file": "drivers/firmware/qcom/qcom_scm-smc.c"
},
"deprecated": false,
"digest": {
"length": 1513.0,
"function_hash": "128404520128029599879794358639116862608"
},
"signature_type": "Function"
},
{
"id": "CVE-2024-57852-5ae8e7f4",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cd955b75849b58b650ca3f87b83bd78cde1da8bc",
"signature_version": "v1",
"target": {
"file": "drivers/firmware/qcom/qcom_scm-smc.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"246691212584416788102732096653021682001",
"185494581780672353391557594014654491472",
"39534356073943441140803217945548031252",
"71526170938811473422826303003149437392"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2024-57852-71603925",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cd955b75849b58b650ca3f87b83bd78cde1da8bc",
"signature_version": "v1",
"target": {
"function": "__scm_smc_call",
"file": "drivers/firmware/qcom/qcom_scm-smc.c"
},
"deprecated": false,
"digest": {
"length": 1513.0,
"function_hash": "128404520128029599879794358639116862608"
},
"signature_type": "Function"
},
{
"id": "CVE-2024-57852-89e4a77e",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57a811c0886f3f3677bb4619502b35b5bb917f2e",
"signature_version": "v1",
"target": {
"file": "drivers/firmware/qcom/qcom_scm-smc.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"246691212584416788102732096653021682001",
"185494581780672353391557594014654491472",
"39534356073943441140803217945548031252",
"71526170938811473422826303003149437392"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2024-57852-dd3ae007",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@94f48ecf0a538019ca2025e0b0da391f8e7cc58c",
"signature_version": "v1",
"target": {
"file": "drivers/firmware/qcom/qcom_scm-smc.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"246691212584416788102732096653021682001",
"185494581780672353391557594014654491472",
"39534356073943441140803217945548031252",
"71526170938811473422826303003149437392"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2024-57852-dfde466f",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@94f48ecf0a538019ca2025e0b0da391f8e7cc58c",
"signature_version": "v1",
"target": {
"function": "__scm_smc_call",
"file": "drivers/firmware/qcom/qcom_scm-smc.c"
},
"deprecated": false,
"digest": {
"length": 1513.0,
"function_hash": "128404520128029599879794358639116862608"
},
"signature_type": "Function"
}
]