-
CVE-2024-35785
- EPSS 0.05%
- Published 17.05.2024 13:15:58
- Last modified 21.11.2024 09:20:53
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix kernel panic caused by incorrect error handling The error path while failing to register devices on the TEE bus has a bug leading to kernel panic as follows: [ 15.398930] Unable to handle kernel paging request at virtual address ffff07ed00626d7c [ 15.406913] Mem abort info: [ 15.409722] ESR = 0x0000000096000005 [ 15.413490] EC = 0x25: DABT (current EL), IL = 32 bits [ 15.418814] SET = 0, FnV = 0 [ 15.421878] EA = 0, S1PTW = 0 [ 15.425031] FSC = 0x05: level 1 translation fault [ 15.429922] Data abort info: [ 15.432813] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 15.438310] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 15.443372] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 15.448697] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000d9e3e000 [ 15.455413] [ffff07ed00626d7c] pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000 [ 15.464146] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Commit 7269cba53d90 ("tee: optee: Fix supplicant based device enumeration") lead to the introduction of this bug. So fix it appropriately.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
bc40ded92af55760d12bec8222d4108de725dbe4
Version
a953e45ebeae9a5ce342c012f7eb2a92cc8af89b
Status
affected
Version <
4b12ff5edd141926d49c9ace4791adf3a4902fe7
Version
01c13d8a95e0909f0081d6e3e8a891761992371b
Status
affected
Version <
e5b5948c769aa1ebf962dddfb972f87d8f166f95
Version
1c9561b438cbe61e78515fc7b16dc7fb8cf0b763
Status
affected
Version <
520f79c110ff712b391b3d87fcacf03c74bc56ee
Version
d3c4786b01aad8c377718f92d6d9b15906ee0a2a
Status
affected
Version <
bfa344afbe472a9be08f78551fa2190c1a07d7d3
Version
7269cba53d906cf257c139d3b3a53ad272176bca
Status
affected
Version <
95915ba4b987cf2b222b0f251280228a1ff977ac
Version
7269cba53d906cf257c139d3b3a53ad272176bca
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.7
Status
affected
Version <
6.7
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.215
Status
unaffected
Version <=
5.15.*
Version
5.15.154
Status
unaffected
Version <=
6.1.*
Version
6.1.84
Status
unaffected
Version <=
6.6.*
Version
6.6.24
Status
unaffected
Version <=
6.7.*
Version
6.7.12
Status
unaffected
Version <=
*
Version
6.8
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.161 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|