๐Ÿ” CVE Alert

CVE-2024-47674

UNKNOWN 0.0

mm: avoid leaving partial pfn mappings around in error case

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order. In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries. To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 15, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b97a50adb37e98b940a30c4656565ff609aa8f94 < 3213fdcab961026203dd587a4533600c70b3336b 69d4e1ce9087c8767f2fe9b9426fa2755c8e9072 < 35770ca6180caa24a2b258c99a87bd437a1ee10f 74ffa5a3e68504dd289135b1cf0422c19ffb3f2e < 5b2c8b34f6d76bfbd1dd4936eb8a0fbfb9af3959 74ffa5a3e68504dd289135b1cf0422c19ffb3f2e < 65d0db500d7c07f0f76fc24a4d837791c4862cd2 74ffa5a3e68504dd289135b1cf0422c19ffb3f2e < a95a24fcaee1b892e47d5e6dcc403f713874ee80 74ffa5a3e68504dd289135b1cf0422c19ffb3f2e < 954fd4c81f22c4b6ba65379a81fd252971bf4ef3 74ffa5a3e68504dd289135b1cf0422c19ffb3f2e < 79a61cc3fc0466ad2b7b89618a6157785f0293b3
Linux / Linux
5.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3213fdcab961026203dd587a4533600c70b3336b git.kernel.org: https://git.kernel.org/stable/c/35770ca6180caa24a2b258c99a87bd437a1ee10f git.kernel.org: https://git.kernel.org/stable/c/5b2c8b34f6d76bfbd1dd4936eb8a0fbfb9af3959 git.kernel.org: https://git.kernel.org/stable/c/65d0db500d7c07f0f76fc24a4d837791c4862cd2 git.kernel.org: https://git.kernel.org/stable/c/a95a24fcaee1b892e47d5e6dcc403f713874ee80 git.kernel.org: https://git.kernel.org/stable/c/954fd4c81f22c4b6ba65379a81fd252971bf4ef3 git.kernel.org: https://git.kernel.org/stable/c/79a61cc3fc0466ad2b7b89618a6157785f0293b3 project-zero.issues.chromium.org: https://project-zero.issues.chromium.org/issues/366053091 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html