Impact
The double free occurs in the Rockchip USB‑2.0 PHY driver when the probe routine calls of_node_put() twice on a device node that has already been released. The result is a classic Use‑After‑Free that can corrupt kernel memory and potentially lead to a kernel crash or, in an ideal scenario, kernel‐level code execution. Based on the description, it is inferred that an attacker who can influence the probe flow—such as by manipulating device tree entries or forcing the driver to load—can trigger the vulnerability.
Affected Systems
All Linux kernel versions that contain the buggy rockchip_usb2phy_probe() implementation are affected. This code resides in the generic Linux kernel source for Rockchip System‑on‑Chip support and is shipped in all distributions that provide a kernel with this PCI/USB PHY driver. The vulnerability persists until the commit that removes the redundant of_node_put() is applied, with no specific version range given.
Risk and Exploitability
The EPSS score is reported as less than 1 %, and the vulnerability is not listed in CISA’s KEV catalogue, indicating a low likelihood of active exploitation. No public exploits are known, and exploitation would likely require local kernel access or privilege escalation to load a module that initiates the probe routine. The impact is limited to kernel memory corruption and potential denial of service, with arbitrary code execution remaining theoretical.
OpenCVE Enrichment
Debian DLA
Debian DSA