In the Linux kernel, the following vulnerability has been resolved:
drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr()
Subject: [PATCH] drm/panfrost: Fix the error path in
panfrost_mmu_map_fault_addr()
If some the pages or sgt allocation failed, we shouldn't release the
pages ref we got earlier, otherwise we will end up with unbalanced
get/put_pages() calls. We should instead leave everything in place
and let the BO release function deal with extra cleanup when the object
is destroyed, or let the fault handler try again next time it's called.
References
Configurations
Configuration 1 (hide)
|
History
24 Sep 2025, 18:56
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/1fc9af813b25e146d3607669247d0f970f5a87c3 - Patch | |
| References | () https://git.kernel.org/stable/c/31806711e8a4b75e09b1c43652f2a6420e6e1002 - Patch | |
| References | () https://git.kernel.org/stable/c/e18070c622c63f0cab170348e320454728c277aa - Patch | |
| References | () http://www.openwall.com/lists/oss-security/2024/05/30/1 - Mailing List | |
| References | () http://www.openwall.com/lists/oss-security/2024/05/30/2 - Mailing List |
Information
Published : 2024-05-20 10:15
Updated : 2025-09-24 18:56
NVD link : CVE-2024-35951
Mitre link : CVE-2024-35951
CVE.ORG link : CVE-2024-35951
JSON object : View
Products Affected
linux
- linux_kernel
CWE
