Description
In the Linux kernel, the following vulnerability has been resolved:

net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdlc_memclean()

The priv->rx_buffer and priv->tx_buffer are alloc'd together as
contiguous buffers in uhdlc_init() but freed as two buffers in
uhdlc_memclean().

Change the cleanup to only call dma_free_coherent() once on the whole
buffer.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A double free occurs in the fsl_ucc_hdlc driver when the cleanup routine frees a single contiguous buffer twice: once for the receive buffer and again for the transmit buffer. This undefined deallocation corrupts kernel memory and can cause the kernel to crash, resulting in a denial of service. The weakness is a classic double free error (CWE‑416).

Affected Systems

All Linux kernel releases that include the fsl_ucc_hdlc module without the upstream commit are affected. The vulnerable component is the net:wan/fsl_ucc_hdlc subsystem within the Linux kernel.

Risk and Exploitability

The EPSS score is not available, and the vulnerability is not listed in CISA KEV. The severity stems from the fact that a double free in kernel space can trigger an immediate crash. The likely attack vector is local; an attacker must be able to interact with the device driver or force a module unload to trigger the faulty cleanup. No mechanism is documented to achieve code execution, so the primary impact is a denial of service via kernel crash.

Generated by OpenCVE AI on May 6, 2026 at 17:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the upstream patch for the fsl_ucc_hdlc module.
  • If an update is not available, unload or disable the fsl_ucc_hdlc module to prevent the double free from occurring.
  • If maintaining a custom kernel branch, backport the upstream commit that corrects the cleanup and rebuild the kernel.

Generated by OpenCVE AI on May 6, 2026 at 17:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 18:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdlc_memclean() The priv->rx_buffer and priv->tx_buffer are alloc'd together as contiguous buffers in uhdlc_init() but freed as two buffers in uhdlc_memclean(). Change the cleanup to only call dma_free_coherent() once on the whole buffer.
Title net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdlc_memclean()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:31.708Z

Reserved: 2026-05-01T14:12:55.989Z

Link: CVE-2026-43149

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:32.553

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43149

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T17:45:08Z

Weaknesses