CVE-2024-53068
📋 TL;DR
This is a use-after-free vulnerability in the Linux kernel's SCMI (System Control and Management Interface) subsystem where scmi_dev->name is freed prematurely in __scmi_device_destroy(), then accessed later in scmi_bus_notifier(). This can lead to kernel memory corruption and potential system crashes or privilege escalation. It affects Linux systems using the SCMI framework, particularly ARM-based systems.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to denial of service, or potential privilege escalation to kernel mode if an attacker can manipulate the freed memory region before it's reallocated.
Likely Case
System crash or kernel panic causing denial of service, potentially requiring physical access to restart affected devices.
If Mitigated
With proper kernel hardening (KASAN, SLUB hardening), the bug would be detected and cause a controlled crash rather than exploitation.
🎯 Exploit Status
The bug appears to be discovered through code review/fuzzing rather than active exploitation. KASAN detection suggests it would crash before successful exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits: 15b17bbcea07d49c43d21aa700485cbd9f9d00d8, 1e1f523b185a8ccdcba625b31ff0312d052900e2, 295416091e44806760ccf753aeafdafc0ae268f3
Vendor Advisory: https://git.kernel.org/stable/c/15b17bbcea07d49c43d21aa700485cbd9f9d00d8
Restart Required: Yes
Instructions:
1. Update to a kernel version containing the fix commits. 2. For distributions: Apply security updates from your vendor. 3. Reboot to load the new kernel.
🔧 Temporary Workarounds
Disable SCMI subsystem
linuxRemove or blacklist the SCMI kernel module if not needed
echo 'blacklist scmi' >> /etc/modprobe.d/blacklist.conf
rmmod scmi
🧯 If You Can't Patch
- Enable kernel hardening features like KASAN to detect and crash safely instead of allowing exploitation
- Restrict local user access and monitor for suspicious kernel module loading
🔍 How to Verify
Check if Vulnerable:
Check if SCMI is loaded: lsmod | grep scmi. Check kernel version against patched versions.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits or check with: grep -r 'scmi_device_release' /usr/src/linux/drivers/firmware/arm_scmi/
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- KASAN reports of use-after-free in scmi_bus_notifier
- System crashes during SCMI operations
SIEM Query:
source="kernel" AND ("KASAN: slab-use-after-free" OR "scmi_bus_notifier" OR "panic")