We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: tee: amdtee: fix race condition in amdtee_open_session There is a potential race condition in amdtee_open_session that may lead to use-after-free. For instance, in amdtee_open_session() after sess->sess_mask is set, and before setting: sess->session_info[i] = session_info; if amdtee_close_session() closes this same session, then 'sess' data structure will be released, causing kernel panic when 'sess' is accessed within amdtee_open_session(). The solution is to set the bit sess->sess_mask as the last step in amdtee_open_session().
Reserved 2025-04-16 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/f632a90f8e39db39b322107b9a8d438b826a7f4f
git.kernel.org/...c/02b296978a2137d7128151c542e84dc96400bc00
git.kernel.org/...c/a63cce9393e4e7dbc5af82dc87e68cb321cb1a78
git.kernel.org/...c/b3ef9e6fe09f1a132af28c623edcf4d4f39d9f35
git.kernel.org/...c/f8502fba45bd30e1a6a354d9d898bc99d1a11e6d
Support options