CVE-2026-43196
Awaiting Analysis Awaiting Analysis - Queue
Double Free in TI PRUSS Linux Kernel Driver

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: soc: ti: pruss: Fix double free in pruss_clk_mux_setup() In the pruss_clk_mux_setup(), the devm_add_action_or_reset() indirectly calls pruss_of_free_clk_provider(), which calls of_node_put(clk_mux_np) on the error path. However, after the devm_add_action_or_reset() returns, the of_node_put(clk_mux_np) is called again, causing a double free. Fix by returning directly, to avoid the duplicate of_node_put().
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux_kernel linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a double free issue in the Linux kernel's pruss_clk_mux_setup() function within the TI PRUSS subsystem.

Specifically, the function devm_add_action_or_reset() indirectly calls pruss_of_free_clk_provider(), which calls of_node_put(clk_mux_np) on an error path. After devm_add_action_or_reset() returns, of_node_put(clk_mux_np) is called again, causing the same resource to be freed twice.

The fix involves returning directly to avoid calling of_node_put() a second time, thus preventing the double free.


How can this vulnerability impact me? :

This vulnerability involves a double free error in the Linux kernel's pruss_clk_mux_setup() function. A double free can potentially lead to memory corruption, which might be exploited to cause system instability or crashes.

However, the CVE description does not provide specific details on the impact beyond the double free issue, such as whether it can be exploited for privilege escalation or remote code execution.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart