{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-57852","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-02-27T02:16:34.091Z","datePublished":"2025-02-27T02:18:09.544Z","dateUpdated":"2025-09-03T12:59:20.854Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-09-03T12:59:20.854Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: qcom: scm: smc: Handle missing SCM device\n\nCommit ca61d6836e6f (\"firmware: qcom: scm: fix a NULL-pointer\ndereference\") makes it explicit that qcom_scm_get_tzmem_pool() can\nreturn NULL, therefore its users should handle this."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/firmware/qcom/qcom_scm-smc.c"],"versions":[{"version":"ca61d6836e6f4442a77762e1074d2706a2a6e578","lessThan":"cd955b75849b58b650ca3f87b83bd78cde1da8bc","status":"affected","versionType":"git"},{"version":"ca61d6836e6f4442a77762e1074d2706a2a6e578","lessThan":"57a811c0886f3f3677bb4619502b35b5bb917f2e","status":"affected","versionType":"git"},{"version":"ca61d6836e6f4442a77762e1074d2706a2a6e578","lessThan":"94f48ecf0a538019ca2025e0b0da391f8e7cc58c","status":"affected","versionType":"git"},{"version":"3d36e2b1d803f0d1cc674115d295a8f20ddb9268","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/firmware/qcom/qcom_scm-smc.c"],"versions":[{"version":"6.12","status":"affected"},{"version":"0","lessThan":"6.12","status":"unaffected","versionType":"semver"},{"version":"6.12.16","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13.4","lessThanOrEqual":"6.13.*","status":"unaffected","versionType":"semver"},{"version":"6.14","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12","versionEndExcluding":"6.12.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12","versionEndExcluding":"6.13.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12","versionEndExcluding":"6.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/cd955b75849b58b650ca3f87b83bd78cde1da8bc"},{"url":"https://git.kernel.org/stable/c/57a811c0886f3f3677bb4619502b35b5bb917f2e"},{"url":"https://git.kernel.org/stable/c/94f48ecf0a538019ca2025e0b0da391f8e7cc58c"}],"title":"firmware: qcom: scm: smc: Handle missing SCM device","x_generator":{"engine":"bippy-1.2.0"}}}}