CVE-2026-43196
Double Free in TI PRUSS Linux Kernel Driver
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a double free issue in the Linux kernel's pruss_clk_mux_setup() function within the TI PRUSS subsystem.
Specifically, the function devm_add_action_or_reset() indirectly calls pruss_of_free_clk_provider(), which calls of_node_put(clk_mux_np) on an error path. After devm_add_action_or_reset() returns, of_node_put(clk_mux_np) is called again, causing the same resource to be freed twice.
The fix involves returning directly to avoid calling of_node_put() a second time, thus preventing the double free.
How can this vulnerability impact me? :
This vulnerability involves a double free error in the Linux kernel's pruss_clk_mux_setup() function. A double free can potentially lead to memory corruption, which might be exploited to cause system instability or crashes.
However, the CVE description does not provide specific details on the impact beyond the double free issue, such as whether it can be exploited for privilege escalation or remote code execution.