-

CVE-2024-35785

In the Linux kernel, the following vulnerability has been resolved:

tee: optee: Fix kernel panic caused by incorrect error handling

The error path while failing to register devices on the TEE bus has a
bug leading to kernel panic as follows:

[   15.398930] Unable to handle kernel paging request at virtual address ffff07ed00626d7c
[   15.406913] Mem abort info:
[   15.409722]   ESR = 0x0000000096000005
[   15.413490]   EC = 0x25: DABT (current EL), IL = 32 bits
[   15.418814]   SET = 0, FnV = 0
[   15.421878]   EA = 0, S1PTW = 0
[   15.425031]   FSC = 0x05: level 1 translation fault
[   15.429922] Data abort info:
[   15.432813]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[   15.438310]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[   15.443372]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[   15.448697] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000d9e3e000
[   15.455413] [ffff07ed00626d7c] pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000
[   15.464146] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP

Commit 7269cba53d90 ("tee: optee: Fix supplicant based device enumeration")
lead to the introduction of this bug. So fix it appropriately.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < bc40ded92af55760d12bec8222d4108de725dbe4
Version a953e45ebeae9a5ce342c012f7eb2a92cc8af89b
Status affected
Version < 4b12ff5edd141926d49c9ace4791adf3a4902fe7
Version 01c13d8a95e0909f0081d6e3e8a891761992371b
Status affected
Version < e5b5948c769aa1ebf962dddfb972f87d8f166f95
Version 1c9561b438cbe61e78515fc7b16dc7fb8cf0b763
Status affected
Version < 520f79c110ff712b391b3d87fcacf03c74bc56ee
Version d3c4786b01aad8c377718f92d6d9b15906ee0a2a
Status affected
Version < bfa344afbe472a9be08f78551fa2190c1a07d7d3
Version 7269cba53d906cf257c139d3b3a53ad272176bca
Status affected
Version < 95915ba4b987cf2b222b0f251280228a1ff977ac
Version 7269cba53d906cf257c139d3b3a53ad272176bca
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.7
Status affected
Version < 6.7
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.215
Status unaffected
Version <= 5.15.*
Version 5.15.154
Status unaffected
Version <= 6.1.*
Version 6.1.84
Status unaffected
Version <= 6.6.*
Version 6.6.24
Status unaffected
Version <= 6.7.*
Version 6.7.12
Status unaffected
Version <= *
Version 6.8
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.161
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string