CVE-2025-21871

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/03/2025
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tee: optee: Fix supplicant wait loop<br /> <br /> OP-TEE supplicant is a user-space daemon and it&amp;#39;s possible for it<br /> be hung or crashed or killed in the middle of processing an OP-TEE<br /> RPC call. It becomes more complicated when there is incorrect shutdown<br /> ordering of the supplicant process vs the OP-TEE client application which<br /> can eventually lead to system hang-up waiting for the closure of the<br /> client application.<br /> <br /> Allow the client process waiting in kernel for supplicant response to<br /> be killed rather than indefinitely waiting in an unkillable state. Also,<br /> a normal uninterruptible wait should not have resulted in the hung-task<br /> watchdog getting triggered, but the endless loop would.<br /> <br /> This fixes issues observed during system reboot/shutdown when supplicant<br /> got hung for some reason or gets crashed/killed which lead to client<br /> getting hung in an unkillable state. It in turn lead to system being in<br /> hung up state requiring hard power off/on to recover.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.12 (including) 5.4.291 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.235 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.179 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.130 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.80 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.17 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.13.5 (excluding)
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*