CVE-2024-35785: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix kernel panic caused by incorrect error handling The error path while failing to register devices on the TEE bus has a bug leading to kernel panic as follows: [ 15.398930] Unable to handle kernel paging request at virtual address ffff07ed00626d7c [ 15.406913] Mem abort info: [ 15.409722] ESR = 0x0000000096000005 [ 15.413490] EC = 0x25: DABT (current EL), IL = 32 bits [ 15.418814] SET = 0, FnV = 0 [ 15.421878] EA = 0, S1PTW = 0 [ 15.425031] FSC = 0x05: level 1 translation fault [ 15.429922] Data abort info: [ 15.432813] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 15.438310] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 15.443372] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 15.448697] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000d9e3e000 [ 15.455413] [ffff07ed00626d7c] pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000 [ 15.464146] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Commit 7269cba53d90 ("tee: optee: Fix supplicant based device enumeration") lead to the introduction of this bug. So fix it appropriately.
AI Analysis
Technical Summary
CVE-2024-35785 is a vulnerability in the Linux kernel specifically related to the Trusted Execution Environment (TEE) subsystem, more precisely the OP-TEE (Open Portable Trusted Execution Environment) driver. The flaw arises from incorrect error handling in the device registration process on the TEE bus. When the kernel fails to register devices properly, an error path contains a bug that leads to a kernel panic due to an invalid memory access (paging request) at a specific virtual address. The panic is triggered by a level 1 translation fault in the memory management unit, causing the kernel to abort and crash. This vulnerability was introduced by a specific commit (7269cba53d90) that modified supplicant-based device enumeration in the OP-TEE driver. The issue manifests as an internal kernel error (Oops) with detailed memory abort information logged, indicating a severe fault in kernel memory handling. The vulnerability affects multiple Linux kernel versions identified by their commit hashes, and it has been publicly disclosed but currently has no known exploits in the wild. The absence of a CVSS score suggests it is newly discovered and awaiting formal severity assessment. The root cause is a logic error in error path handling, which is critical because it can cause denial of service through kernel crashes. Since the TEE subsystem is used in secure environments to isolate sensitive operations, this vulnerability could impact systems relying on OP-TEE for security functions.
Potential Impact
For European organizations, the impact of CVE-2024-35785 primarily involves potential denial of service (DoS) due to kernel panics on affected Linux systems using the OP-TEE driver. This can disrupt critical services, especially in embedded systems, IoT devices, and industrial control systems that rely on TEE for secure operations. Organizations in sectors such as telecommunications, automotive, manufacturing, and government infrastructure that deploy Linux-based devices with OP-TEE support could face operational interruptions. Although no remote code execution or privilege escalation is indicated, the kernel panic can cause system downtime, data loss, or require manual intervention to restore service. In environments with high availability requirements, such as data centers or critical infrastructure, this vulnerability could degrade reliability and increase maintenance costs. Additionally, since OP-TEE is often used in ARM-based platforms, organizations using ARM servers or edge devices may be more affected. The lack of known exploits reduces immediate risk, but the vulnerability’s presence in the kernel means that attackers with local access or the ability to trigger device registration failures could cause system crashes, impacting confidentiality indirectly by disrupting secure operations.
Mitigation Recommendations
To mitigate CVE-2024-35785, European organizations should: 1) Apply the latest Linux kernel patches that fix the OP-TEE device registration error handling as soon as they become available from trusted Linux distributions or kernel maintainers. 2) Audit and monitor systems using OP-TEE to detect abnormal kernel panics or device registration failures that could indicate attempts to trigger this vulnerability. 3) Limit local access to systems running vulnerable kernel versions to reduce the risk of exploitation by unauthorized users. 4) For embedded or IoT devices, coordinate with hardware and software vendors to ensure firmware and kernel updates include the fix. 5) Implement robust system recovery procedures to quickly restore services after a kernel panic. 6) Consider disabling or restricting TEE functionality if it is not required for the device’s operation, reducing the attack surface. 7) Conduct thorough testing of kernel updates in staging environments before deployment to avoid regressions. These steps go beyond generic advice by focusing on the specific subsystem affected and the operational context of OP-TEE in secure environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2024-35785: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix kernel panic caused by incorrect error handling The error path while failing to register devices on the TEE bus has a bug leading to kernel panic as follows: [ 15.398930] Unable to handle kernel paging request at virtual address ffff07ed00626d7c [ 15.406913] Mem abort info: [ 15.409722] ESR = 0x0000000096000005 [ 15.413490] EC = 0x25: DABT (current EL), IL = 32 bits [ 15.418814] SET = 0, FnV = 0 [ 15.421878] EA = 0, S1PTW = 0 [ 15.425031] FSC = 0x05: level 1 translation fault [ 15.429922] Data abort info: [ 15.432813] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 15.438310] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 15.443372] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 15.448697] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000d9e3e000 [ 15.455413] [ffff07ed00626d7c] pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000 [ 15.464146] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Commit 7269cba53d90 ("tee: optee: Fix supplicant based device enumeration") lead to the introduction of this bug. So fix it appropriately.
AI-Powered Analysis
Technical Analysis
CVE-2024-35785 is a vulnerability in the Linux kernel specifically related to the Trusted Execution Environment (TEE) subsystem, more precisely the OP-TEE (Open Portable Trusted Execution Environment) driver. The flaw arises from incorrect error handling in the device registration process on the TEE bus. When the kernel fails to register devices properly, an error path contains a bug that leads to a kernel panic due to an invalid memory access (paging request) at a specific virtual address. The panic is triggered by a level 1 translation fault in the memory management unit, causing the kernel to abort and crash. This vulnerability was introduced by a specific commit (7269cba53d90) that modified supplicant-based device enumeration in the OP-TEE driver. The issue manifests as an internal kernel error (Oops) with detailed memory abort information logged, indicating a severe fault in kernel memory handling. The vulnerability affects multiple Linux kernel versions identified by their commit hashes, and it has been publicly disclosed but currently has no known exploits in the wild. The absence of a CVSS score suggests it is newly discovered and awaiting formal severity assessment. The root cause is a logic error in error path handling, which is critical because it can cause denial of service through kernel crashes. Since the TEE subsystem is used in secure environments to isolate sensitive operations, this vulnerability could impact systems relying on OP-TEE for security functions.
Potential Impact
For European organizations, the impact of CVE-2024-35785 primarily involves potential denial of service (DoS) due to kernel panics on affected Linux systems using the OP-TEE driver. This can disrupt critical services, especially in embedded systems, IoT devices, and industrial control systems that rely on TEE for secure operations. Organizations in sectors such as telecommunications, automotive, manufacturing, and government infrastructure that deploy Linux-based devices with OP-TEE support could face operational interruptions. Although no remote code execution or privilege escalation is indicated, the kernel panic can cause system downtime, data loss, or require manual intervention to restore service. In environments with high availability requirements, such as data centers or critical infrastructure, this vulnerability could degrade reliability and increase maintenance costs. Additionally, since OP-TEE is often used in ARM-based platforms, organizations using ARM servers or edge devices may be more affected. The lack of known exploits reduces immediate risk, but the vulnerability’s presence in the kernel means that attackers with local access or the ability to trigger device registration failures could cause system crashes, impacting confidentiality indirectly by disrupting secure operations.
Mitigation Recommendations
To mitigate CVE-2024-35785, European organizations should: 1) Apply the latest Linux kernel patches that fix the OP-TEE device registration error handling as soon as they become available from trusted Linux distributions or kernel maintainers. 2) Audit and monitor systems using OP-TEE to detect abnormal kernel panics or device registration failures that could indicate attempts to trigger this vulnerability. 3) Limit local access to systems running vulnerable kernel versions to reduce the risk of exploitation by unauthorized users. 4) For embedded or IoT devices, coordinate with hardware and software vendors to ensure firmware and kernel updates include the fix. 5) Implement robust system recovery procedures to quickly restore services after a kernel panic. 6) Consider disabling or restricting TEE functionality if it is not required for the device’s operation, reducing the attack surface. 7) Conduct thorough testing of kernel updates in staging environments before deployment to avoid regressions. These steps go beyond generic advice by focusing on the specific subsystem affected and the operational context of OP-TEE in secure environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T12:19:12.338Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe3485
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 3:55:28 PM
Last updated: 8/17/2025, 8:54:06 PM
Views: 19
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.