๐Ÿ” CVE Alert

CVE-2024-58084

MEDIUM 5.5

firmware: qcom: scm: Fix missing read barrier in qcom_scm_get_tzmem_pool()

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: scm: Fix missing read barrier in qcom_scm_get_tzmem_pool() Commit 2e4955167ec5 ("firmware: qcom: scm: Fix __scm and waitq completion variable initialization") introduced a write barrier in probe function to store global '__scm' variable. We all known barriers are paired (see memory-barriers.txt: "Note that write barriers should normally be paired with read or address-dependency barriers"), therefore accessing it from concurrent contexts requires read barrier. Previous commit added such barrier in qcom_scm_is_available(), so let's use that directly. Lack of this read barrier can result in fetching stale '__scm' variable value, NULL, and dereferencing it. Note that barrier in qcom_scm_is_available() satisfies here the control dependency.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 6, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
449d0d84bcd8246b508d07995326d13c54488b8c < fee921e3c641f64185abee83f9a6e65f0b380682 449d0d84bcd8246b508d07995326d13c54488b8c < e03db7c1255ebabba5e1a447754faeb138de15a2 449d0d84bcd8246b508d07995326d13c54488b8c < b628510397b5cafa1f5d3e848a28affd1c635302
Linux / Linux
6.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/fee921e3c641f64185abee83f9a6e65f0b380682 git.kernel.org: https://git.kernel.org/stable/c/e03db7c1255ebabba5e1a447754faeb138de15a2 git.kernel.org: https://git.kernel.org/stable/c/b628510397b5cafa1f5d3e848a28affd1c635302