CVE-2024-53068

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's SCMI (System Control and Management Interface) subsystem where scmi_dev->name is freed prematurely in __scmi_device_destroy(), then accessed later in scmi_bus_notifier(). This can lead to kernel memory corruption and potential system crashes or privilege escalation. It affects Linux systems using the SCMI framework, particularly ARM-based systems.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions containing the vulnerable SCMI code (specific versions not provided, but based on CVE date likely affects recent kernels before fix)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the SCMI framework, commonly found on ARM-based systems for power management and system control.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to denial of service, or potential privilege escalation to kernel mode if an attacker can manipulate the freed memory region before it's reallocated.

🟠

Likely Case

System crash or kernel panic causing denial of service, potentially requiring physical access to restart affected devices.

🟢

If Mitigated

With proper kernel hardening (KASAN, SLUB hardening), the bug would be detected and cause a controlled crash rather than exploitation.

🌐 Internet-Facing: LOW - This is a kernel-level vulnerability requiring local access or ability to load kernel modules.
🏢 Internal Only: MEDIUM - Local users or processes could potentially trigger the bug, but exploitation requires specific conditions and kernel access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires local access and ability to trigger specific SCMI device operations.

The bug appears to be discovered through code review/fuzzing rather than active exploitation. KASAN detection suggests it would crash before successful exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 15b17bbcea07d49c43d21aa700485cbd9f9d00d8, 1e1f523b185a8ccdcba625b31ff0312d052900e2, 295416091e44806760ccf753aeafdafc0ae268f3

Vendor Advisory: https://git.kernel.org/stable/c/15b17bbcea07d49c43d21aa700485cbd9f9d00d8

Restart Required: Yes

Instructions:

1. Update to a kernel version containing the fix commits. 2. For distributions: Apply security updates from your vendor. 3. Reboot to load the new kernel.

🔧 Temporary Workarounds

Disable SCMI subsystem

linux

Remove or blacklist the SCMI kernel module if not needed

echo 'blacklist scmi' >> /etc/modprobe.d/blacklist.conf
rmmod scmi

🧯 If You Can't Patch

  • Enable kernel hardening features like KASAN to detect and crash safely instead of allowing exploitation
  • Restrict local user access and monitor for suspicious kernel module loading

🔍 How to Verify

Check if Vulnerable:

Check if SCMI is loaded: lsmod | grep scmi. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or check with: grep -r 'scmi_device_release' /usr/src/linux/drivers/firmware/arm_scmi/

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN reports of use-after-free in scmi_bus_notifier
  • System crashes during SCMI operations

SIEM Query:

source="kernel" AND ("KASAN: slab-use-after-free" OR "scmi_bus_notifier" OR "panic")

🔗 References

📤 Share & Export