In the Linux kernel, the following vulnerability has been resolved: tee:
optee: Fix kernel panic caused by incorrect error handling The error path
while failing to register devices on the TEE bus has a bug leading to
kernel panic as follows: [ 15.398930] Unable to handle kernel paging
request at virtual address ffff07ed00626d7c [ 15.406913] Mem abort info: [
15.409722] ESR = 0x0000000096000005 [ 15.413490] EC = 0x25: DABT (current
EL), IL = 32 bits [ 15.418814] SET = 0, FnV = 0 [ 15.421878] EA = 0, S1PTW
= 0 [ 15.425031] FSC = 0x05: level 1 translation fault [ 15.429922] Data
abort info: [ 15.432813] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [
15.438310] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 15.443372] GCS = 0,
Overlay = 0, DirtyBit = 0, Xs = 0 [ 15.448697] swapper pgtable: 4k pages,
48-bit VAs, pgdp=00000000d9e3e000 [ 15.455413] [ffff07ed00626d7c]
pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000 [
15.464146] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Commit
7269cba53d90 (“tee: optee: Fix supplicant based device enumeration”) lead
to the introduction of this bug. So fix it appropriately.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | linux | < 5.15.0-116.126 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1065.71 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1065.71~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1068.77 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < 5.15.0-1068.77~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-6.5 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-fde | < 5.15.0-1068.77.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-fde-5.15 | < 5.15.0-1068.77~20.04.1.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-gcp | < 5.15.0-1064.72 | UNKNOWN |
git.kernel.org/linus/95915ba4b987cf2b222b0f251280228a1ff977ac (6.8)
git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7
git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee
git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac
git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4
git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3
git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95
launchpad.net/bugs/cve/CVE-2024-35785
nvd.nist.gov/vuln/detail/CVE-2024-35785
security-tracker.debian.org/tracker/CVE-2024-35785
ubuntu.com/security/notices/USN-6898-1
ubuntu.com/security/notices/USN-6898-2
ubuntu.com/security/notices/USN-6898-3
ubuntu.com/security/notices/USN-6898-4
ubuntu.com/security/notices/USN-6917-1
ubuntu.com/security/notices/USN-6919-1
www.cve.org/CVERecord?id=CVE-2024-35785