A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/tee/tee_shm.c | vendor advisory |
https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander%40linaro.org/ | |
https://github.com/pjlantz/optee-qemu/blob/main/README.md | third party advisory exploit |
https://security.netapp.com/advisory/ntap-20220114-0003/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5096 | third party advisory vendor advisory |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dfd0743f1d9ea76931510ed150334d571fbab49d |