Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2025-39865

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
19/09/2025
Última modificación:
19/09/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tee: fix NULL pointer dereference in tee_shm_put<br /> <br /> tee_shm_put have NULL pointer dereference:<br /> <br /> __optee_disable_shm_cache --&gt;<br /> shm = reg_pair_to_ptr(...);//shm maybe return NULL<br /> tee_shm_free(shm); --&gt;<br /> tee_shm_put(shm);//crash<br /> <br /> Add check in tee_shm_put to fix it.<br /> <br /> panic log:<br /> Unable to handle kernel paging request at virtual address 0000000000100cca<br /> Mem abort info:<br /> ESR = 0x0000000096000004<br /> EC = 0x25: DABT (current EL), IL = 32 bits<br /> SET = 0, FnV = 0<br /> EA = 0, S1PTW = 0<br /> FSC = 0x04: level 0 translation fault<br /> Data abort info:<br /> ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000<br /> CM = 0, WnR = 0, TnD = 0, TagAccess = 0<br /> GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0<br /> user pgtable: 4k pages, 48-bit VAs, pgdp=0000002049d07000<br /> [0000000000100cca] pgd=0000000000000000, p4d=0000000000000000<br /> Internal error: Oops: 0000000096000004 [#1] SMP<br /> CPU: 2 PID: 14442 Comm: systemd-sleep Tainted: P OE ------- ----<br /> 6.6.0-39-generic #38<br /> Source Version: 938b255f6cb8817c95b0dd5c8c2944acfce94b07<br /> Hardware name: greatwall GW-001Y1A-FTH, BIOS Great Wall BIOS V3.0<br /> 10/26/2022<br /> pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> pc : tee_shm_put+0x24/0x188<br /> lr : tee_shm_free+0x14/0x28<br /> sp : ffff001f98f9faf0<br /> x29: ffff001f98f9faf0 x28: ffff0020df543cc0 x27: 0000000000000000<br /> x26: ffff001f811344a0 x25: ffff8000818dac00 x24: ffff800082d8d048<br /> x23: ffff001f850fcd18 x22: 0000000000000001 x21: ffff001f98f9fb88<br /> x20: ffff001f83e76218 x19: ffff001f83e761e0 x18: 000000000000ffff<br /> x17: 303a30303a303030 x16: 0000000000000000 x15: 0000000000000003<br /> x14: 0000000000000001 x13: 0000000000000000 x12: 0101010101010101<br /> x11: 0000000000000001 x10: 0000000000000001 x9 : ffff800080e08d0c<br /> x8 : ffff001f98f9fb88 x7 : 0000000000000000 x6 : 0000000000000000<br /> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000<br /> x2 : ffff001f83e761e0 x1 : 00000000ffff001f x0 : 0000000000100cca<br /> Call trace:<br /> tee_shm_put+0x24/0x188<br /> tee_shm_free+0x14/0x28<br /> __optee_disable_shm_cache+0xa8/0x108<br /> optee_shutdown+0x28/0x38<br /> platform_shutdown+0x28/0x40<br /> device_shutdown+0x144/0x2b0<br /> kernel_power_off+0x3c/0x80<br /> hibernate+0x35c/0x388<br /> state_store+0x64/0x80<br /> kobj_attr_store+0x14/0x28<br /> sysfs_kf_write+0x48/0x60<br /> kernfs_fop_write_iter+0x128/0x1c0<br /> vfs_write+0x270/0x370<br /> ksys_write+0x6c/0x100<br /> __arm64_sys_write+0x20/0x30<br /> invoke_syscall+0x4c/0x120<br /> el0_svc_common.constprop.0+0x44/0xf0<br /> do_el0_svc+0x24/0x38<br /> el0_svc+0x24/0x88<br /> el0t_64_sync_handler+0x134/0x150<br /> el0t_64_sync+0x14c/0x15

Impacto