CVE-2025-21871

MEDIUM

Linux kernel - Use After Free

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix supplicant wait loop OP-TEE supplicant is a user-space daemon and it's possible for it be hung or crashed or killed in the middle of processing an OP-TEE RPC call. It becomes more complicated when there is incorrect shutdown ordering of the supplicant process vs the OP-TEE client application which can eventually lead to system hang-up waiting for the closure of the client application. Allow the client process waiting in kernel for supplicant response to be killed rather than indefinitely waiting in an unkillable state. Also, a normal uninterruptible wait should not have resulted in the hung-task watchdog getting triggered, but the endless loop would. This fixes issues observed during system reboot/shutdown when supplicant got hung for some reason or gets crashed/killed which lead to client getting hung in an unkillable state. It in turn lead to system being in hung up state requiring hard power off/on to recover.

Scores

CVSS v3 5.5
EPSS 0.0009
EPSS Percentile 25.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-835
Status published
Products (9)
linux/Kernel 4.12.0 - 5.4.291linux
linux/Kernel 5.11.0 - 5.15.179linux
linux/Kernel 5.16.0 - 6.1.130linux
linux/Kernel 5.5.0 - 5.10.235linux
linux/Kernel 6.13.0 - 6.13.5linux
linux/Kernel 6.2.0 - 6.6.80linux
linux/Kernel 6.7.0 - 6.12.17linux
linux/linux_kernel 6.14 rc1 (3 CPE variants)
linux/linux_kernel 4.12 - 5.4.291
Published Mar 27, 2025
Tracked Since Feb 18, 2026