CVE-2024-35785
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/05/2024
Last modified:
22/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tee: optee: Fix kernel panic caused by incorrect error handling<br />
<br />
The error path while failing to register devices on the TEE bus has a<br />
bug leading to kernel panic as follows:<br />
<br />
[ 15.398930] Unable to handle kernel paging request at virtual address ffff07ed00626d7c<br />
[ 15.406913] Mem abort info:<br />
[ 15.409722] ESR = 0x0000000096000005<br />
[ 15.413490] EC = 0x25: DABT (current EL), IL = 32 bits<br />
[ 15.418814] SET = 0, FnV = 0<br />
[ 15.421878] EA = 0, S1PTW = 0<br />
[ 15.425031] FSC = 0x05: level 1 translation fault<br />
[ 15.429922] Data abort info:<br />
[ 15.432813] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000<br />
[ 15.438310] CM = 0, WnR = 0, TnD = 0, TagAccess = 0<br />
[ 15.443372] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0<br />
[ 15.448697] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000d9e3e000<br />
[ 15.455413] [ffff07ed00626d7c] pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000<br />
[ 15.464146] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP<br />
<br />
Commit 7269cba53d90 ("tee: optee: Fix supplicant based device enumeration")<br />
lead to the introduction of this bug. So fix it appropriately.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.204 (including) | 5.10.215 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.143 (including) | 5.15.154 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.68 (including) | 6.1.84 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.7 (including) | 6.6.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7.1 (including) | 6.7.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.7:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.7:rc8:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7
- https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee
- https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac
- https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4
- https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3
- https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95
- https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7
- https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee
- https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac
- https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4
- https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3
- https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html



