CVE-2024-58007

7.1 HIGH

📋 TL;DR

This vulnerability in the Linux kernel's Qualcomm SOC info driver allows an out-of-bounds read of memory when accessing the serial number on MSM8916 devices. It affects Linux systems running on Qualcomm MSM8916 hardware. The issue occurs because bounds checking incorrectly compares the start offset rather than the end offset of the serial number field.

💻 Affected Systems

Products:
  • Linux kernel with Qualcomm SOC info driver
Versions: Linux kernel versions before the fix commits
Operating Systems: Linux distributions running on Qualcomm MSM8916 hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Qualcomm MSM8916 SOC and SOCINFO_VERSION(0, 8) firmware. The serial number is always reported as 2644893864 on vulnerable systems.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure of kernel memory contents, potentially exposing sensitive data or memory layout that could aid further exploitation.

🟠

Likely Case

Exposure of constant, incorrect serial number (2644893864) on affected devices, with potential for reading random memory contents beyond the socinfo struct.

🟢

If Mitigated

No serial number exposure on MSM8916 devices, preventing information disclosure.

🌐 Internet-Facing: LOW - Requires local access to sysfs interface.
🏢 Internal Only: MEDIUM - Local users or processes can read kernel memory, potentially aiding privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to read /sys/devices/soc0/serial_number. The vulnerability is an information disclosure rather than code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 0a92feddae0634a0b87c04b19d343f6af97af700 or related stable backports

Vendor Advisory: https://git.kernel.org/stable/c/0a92feddae0634a0b87c04b19d343f6af97af700

Restart Required: No

Instructions:

1. Update Linux kernel to version containing the fix. 2. For embedded systems, update the kernel image. 3. No service restart required as it's a kernel driver fix.

🔧 Temporary Workarounds

Disable serial number access

all

Remove read permissions from the serial_number sysfs file

chmod 000 /sys/devices/soc0/serial_number

🧯 If You Can't Patch

  • Implement strict access controls to limit who can read sysfs files
  • Monitor for unusual access patterns to /sys/devices/soc0/serial_number

🔍 How to Verify

Check if Vulnerable:

Check if cat /sys/devices/soc0/serial_number returns 2644893864 on MSM8916 hardware

Check Version:

uname -r to check kernel version

Verify Fix Applied:

After patching, the serial number should either show correct value or not be accessible on MSM8916

📡 Detection & Monitoring

Log Indicators:

  • Audit logs showing access to /sys/devices/soc0/serial_number

Network Indicators:

  • None - local vulnerability only

SIEM Query:

process.name=cat AND file.path=/sys/devices/soc0/serial_number

🔗 References

📤 Share & Export