In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix supplicant wait loop OP-TEE supplicant is a user-space daemon and it's possible for it be hung or crashed or killed in the middle of processing an OP-TEE RPC call. It becomes more complicated when there is incorrect shutdown ordering of the supplicant process vs the OP-TEE client application which can eventually lead to system hang-up waiting for the closure of the client application. Allow the client process waiting in kernel for supplicant response to be killed rather than indefinitely waiting in an unkillable state. Also, a normal uninterruptible wait should not have resulted in the hung-task watchdog getting triggered, but the endless loop would. This fixes issues observed during system reboot/shutdown when supplicant got hung for some reason or gets crashed/killed which lead to client getting hung in an unkillable state. It in turn lead to system being in hung up state requiring hard power off/on to recover.
2025-03-27T14:15:48.860
2025-11-03T20:17:24.367
Modified
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSSv3.1: 5.5 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | linux | linux_kernel | < 5.4.291 | Yes |
| Operating System | linux | linux_kernel | < 5.10.235 | Yes |
| Operating System | linux | linux_kernel | < 5.15.179 | Yes |
| Operating System | linux | linux_kernel | < 6.1.130 | Yes |
| Operating System | linux | linux_kernel | < 6.6.80 | Yes |
| Operating System | linux | linux_kernel | < 6.12.17 | Yes |
| Operating System | linux | linux_kernel | < 6.13.5 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |