CVE-2025-21871
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/03/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tee: optee: Fix supplicant wait loop<br />
<br />
OP-TEE supplicant is a user-space daemon and it&#39;s possible for it<br />
be hung or crashed or killed in the middle of processing an OP-TEE<br />
RPC call. It becomes more complicated when there is incorrect shutdown<br />
ordering of the supplicant process vs the OP-TEE client application which<br />
can eventually lead to system hang-up waiting for the closure of the<br />
client application.<br />
<br />
Allow the client process waiting in kernel for supplicant response to<br />
be killed rather than indefinitely waiting in an unkillable state. Also,<br />
a normal uninterruptible wait should not have resulted in the hung-task<br />
watchdog getting triggered, but the endless loop would.<br />
<br />
This fixes issues observed during system reboot/shutdown when supplicant<br />
got hung for some reason or gets crashed/killed which lead to client<br />
getting hung in an unkillable state. It in turn lead to system being in<br />
hung up state requiring hard power off/on to recover.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.12 (including) | 5.4.291 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.235 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.179 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.130 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.80 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0180cf0373f84fff61b16f8c062553a13dd7cfca
- https://git.kernel.org/stable/c/21234efe2a8474a6d2d01ea9573319de7858ce44
- https://git.kernel.org/stable/c/3eb4911364c764572e9db4ab900a57689a54e8ce
- https://git.kernel.org/stable/c/70b0d6b0a199c5a3ee6c72f5e61681ed6f759612
- https://git.kernel.org/stable/c/c0a9a948159153be145f9471435695373904ee6d
- https://git.kernel.org/stable/c/d61cc1a435e6894bfb0dd3370c6f765d2d12825d
- https://git.kernel.org/stable/c/ec18520f5edc20a00c34a8c9fdd6507c355e880f
- https://git.kernel.org/stable/c/fd9d2d6124c293e40797a080adf8a9c237efd8b8
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



