Impact
A double free occurs in the fsl_ucc_hdlc driver when the cleanup routine frees a single contiguous buffer twice: once for the receive buffer and again for the transmit buffer. This undefined deallocation corrupts kernel memory and can cause the kernel to crash, resulting in a denial of service. The weakness is a classic double free error (CWE‑416).
Affected Systems
All Linux kernel releases that include the fsl_ucc_hdlc module without the upstream commit are affected. The vulnerable component is the net:wan/fsl_ucc_hdlc subsystem within the Linux kernel.
Risk and Exploitability
The EPSS score is not available, and the vulnerability is not listed in CISA KEV. The severity stems from the fact that a double free in kernel space can trigger an immediate crash. The likely attack vector is local; an attacker must be able to interact with the device driver or force a module unload to trigger the faulty cleanup. No mechanism is documented to achieve code execution, so the primary impact is a denial of service via kernel crash.
OpenCVE Enrichment