In the Linux kernel, the following vulnerability has been resolved: eth: fbnic: avoid double free when failing to DMA-map FW msg The semantics are that caller of fbnic_mbx_map_msg() retains the ownership of the message on error. All existing callers dutifully free the page.
https://git.kernel.org/stable/c/670179265ad787b9dd8e701601914618b8927755
https://git.kernel.org/stable/c/5bd1bafd4474ee26f504b41aba11f3e2a1175b88
https://git.kernel.org/stable/c/0a211e23852019ef55c70094524e87a944accbb5