In the Linux kernel, the following vulnerability has been resolved:
tee: optee: Fix kernel panic caused by incorrect error handling
The error path while failing to register devices on the TEE bus has a
bug leading to kernel panic as follows:
[ 15.398930] Unable to handle kernel paging request at virtual address ffff07ed00626d7c
[ 15.406913] Mem abort info:
[ 15.409722] ESR = 0x0000000096000005
[ 15.413490] EC = 0x25: DABT (current EL), IL = 32 bits
[ 15.418814] SET = 0, FnV = 0
[ 15.421878] EA = 0, S1PTW = 0
[ 15.425031] FSC = 0x05: level 1 translation fault
[ 15.429922] Data abort info:
[ 15.432813] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[ 15.438310] CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[ 15.443372] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[ 15.448697] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000d9e3e000
[ 15.455413] [ffff07ed00626d7c] pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000
[ 15.464146] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
Commit 7269cba53d90 ("tee: optee: Fix supplicant based device enumeration")
lead to the introduction of this bug. So fix it appropriately.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Jan 2026, 20:41
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-754 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.7:rc8:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc7:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7 - Patch | |
| References | () https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee - Patch | |
| References | () https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac - Patch | |
| References | () https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4 - Patch | |
| References | () https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3 - Patch | |
| References | () https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory |
21 Nov 2024, 09:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7 - | |
| References | () https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee - | |
| References | () https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac - | |
| References | () https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4 - | |
| References | () https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3 - | |
| References | () https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95 - |
05 Nov 2024, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
17 May 2024, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-17 13:15
Updated : 2026-01-22 20:41
NVD link : CVE-2024-35785
Mitre link : CVE-2024-35785
CVE.ORG link : CVE-2024-35785
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions
