In the Linux kernel, the following vulnerability has been resolved: tee: amdtee: fix race condition in amdtee_open_session There is a potential race condition in amdtee_open_session that may lead to use-after-free. For instance, in amdtee_open_session() after sess->sess_mask is set, and before setting: sess->session_info[i] = session_info; if amdtee_close_session() closes this same session, then 'sess' data structure will be released, causing kernel panic when 'sess' is accessed within amdtee_open_session(). The solution is to set the bit sess->sess_mask as the last step in amdtee_open_session().
2025-05-02T16:15:23.790
2025-11-12T16:46:56.800
Analyzed
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSSv3.1: 4.7 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | linux | linux_kernel | < 5.10.177 | Yes |
| Operating System | linux | linux_kernel | < 5.15.105 | Yes |
| Operating System | linux | linux_kernel | < 6.1.22 | Yes |
| Operating System | linux | linux_kernel | < 6.2.9 | Yes |
| Operating System | linux | linux_kernel | 6.3 | Yes |
| Operating System | linux | linux_kernel | 6.3 | Yes |
| Operating System | linux | linux_kernel | 6.3 | Yes |