CVE-2024-35785

In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix kernel panic caused by incorrect error handling The error path while failing to register devices on the TEE bus has a bug leading to kernel panic as follows: [ 15.398930] Unable to handle kernel paging request at virtual address ffff07ed00626d7c [ 15.406913] Mem abort info: [ 15.409722] ESR = 0x0000000096000005 [ 15.413490] EC = 0x25: DABT (current EL), IL = 32 bits [ 15.418814] SET = 0, FnV = 0 [ 15.421878] EA = 0, S1PTW = 0 [ 15.425031] FSC = 0x05: level 1 translation fault [ 15.429922] Data abort info: [ 15.432813] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 15.438310] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 15.443372] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 15.448697] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000d9e3e000 [ 15.455413] [ffff07ed00626d7c] pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000 [ 15.464146] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Commit 7269cba53d90 ("tee: optee: Fix supplicant based device enumeration") lead to the introduction of this bug. So fix it appropriately.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc7:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

22 Jan 2026, 20:41

Type Values Removed Values Added
CWE CWE-754
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.7:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc7:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7 - () https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7 - Patch
References () https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee - () https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee - Patch
References () https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac - () https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac - Patch
References () https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4 - () https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4 - Patch
References () https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3 - () https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3 - Patch
References () https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95 - () https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory

21 Nov 2024, 09:20

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7 - () https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7 -
References () https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee - () https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee -
References () https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac - () https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac -
References () https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4 - () https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4 -
References () https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3 - () https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3 -
References () https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95 - () https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tee: optee: corrige el pánico del kernel causado por un manejo incorrecto de errores. La ruta de error al no poder registrar dispositivos en el bus TEE tiene un error que provoca el pánico del kernel de la siguiente manera: [15.398930] No se puede para manejar la solicitud de paginación del kernel en la dirección virtual ffff07ed00626d7c [15.406913] Información de cancelación de memoria: [15.409722] ESR = 0x0000000096000005 [15.413490] EC = 0x25: DABT (EL actual), IL = 32 bits [15.418814] SET = 0, FnV = 0 [ 15.421878] EA = 0, S1PTW = 0 [ 15.425031] FSC = 0x05: error de traducción de nivel 1 [ 15.429922] Información de cancelación de datos: [ 15.432813] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 15.438 310] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [15.443372] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [15.448697] tabla de intercambio: páginas de 4k, VA de 48 bits, pgdp=00000000d9e3e000 [15.455413] 00626d7c] pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000 [15.464146] Error interno: Ups: 0000000096000005 [#1] PREEMPT SMP Commit 7269cba53d90 ("tee opt: ee: Reparar la enumeración de dispositivos basada en solicitantes") conducen a la introducción de este error. Así que arréglalo apropiadamente.

17 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 13:15

Updated : 2026-01-22 20:41


NVD link : CVE-2024-35785

Mitre link : CVE-2024-35785

CVE.ORG link : CVE-2024-35785


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions