In the Linux kernel, the following vulnerability has been resolved:
drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() Subject:
[PATCH] drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr()
If some the pages or sgt allocation failed, we shouldn’t release the pages
ref we got earlier, otherwise we will end up with unbalanced
get/put_pages() calls. We should instead leave everything in place and let
the BO release function deal with extra cleanup when the object is
destroyed, or let the fault handler try again next time it’s called.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/1fc9af813b25e146d3607669247d0f970f5a87c3 (6.9-rc4)
git.kernel.org/stable/c/1fc9af813b25e146d3607669247d0f970f5a87c3
git.kernel.org/stable/c/31806711e8a4b75e09b1c43652f2a6420e6e1002
git.kernel.org/stable/c/e18070c622c63f0cab170348e320454728c277aa
launchpad.net/bugs/cve/CVE-2024-35951
nvd.nist.gov/vuln/detail/CVE-2024-35951
security-tracker.debian.org/tracker/CVE-2024-35951
www.cve.org/CVERecord?id=CVE-2024-35951