Description
In the Linux kernel, the following vulnerability has been resolved:

soc: ti: pruss: Fix double free in pruss_clk_mux_setup()

In the pruss_clk_mux_setup(), the devm_add_action_or_reset() indirectly
calls pruss_of_free_clk_provider(), which calls of_node_put(clk_mux_np)
on the error path. However, after the devm_add_action_or_reset()
returns, the of_node_put(clk_mux_np) is called again, causing a double
free.

Fix by returning directly, to avoid the duplicate of_node_put().
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A double‑free bug exists in the PRUSS clock‑multiplexer setup routine of the Linux kernel. When an error occurs during device initialization, the code releases a device‑tree node reference twice, corrupting kernel memory. This corruption can lead to a kernel crash. The impact is confined to kernel space; user‑space applications are not directly affected.

Affected Systems

All Linux kernel builds that include the PRUSS driver and have not incorporated the fix are affected. Distributions running such kernels on hardware that enables the PRUSS subsystem are at risk. The impact is confined to kernel space; user‑space applications are not directly affected.

Risk and Exploitability

The vulnerability is a double‑free that corrupts kernel memory. No EPSS score or CVSS score is provided in the data, and the flaw is not listed in the CISA KEV catalog. Exploitation would likely require a local attacker capable of triggering the fault during PRUSS initialization or a scenario where the device can be controlled remotely. The principal risk is kernel memory corruption that could bring down the system.

Generated by OpenCVE AI on May 6, 2026 at 16:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel patch that removes the duplicate of_node_put() in pruss_clk_mux_setup().
  • If an immediate update is not possible, disable the PRUSS driver in the kernel configuration to prevent use of the vulnerable code.
  • Reboot the system after applying the patch or disabling the driver to ensure the new kernel state is active.

Generated by OpenCVE AI on May 6, 2026 at 16:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 17:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-415

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: soc: ti: pruss: Fix double free in pruss_clk_mux_setup() In the pruss_clk_mux_setup(), the devm_add_action_or_reset() indirectly calls pruss_of_free_clk_provider(), which calls of_node_put(clk_mux_np) on the error path. However, after the devm_add_action_or_reset() returns, the of_node_put(clk_mux_np) is called again, causing a double free. Fix by returning directly, to avoid the duplicate of_node_put().
Title soc: ti: pruss: Fix double free in pruss_clk_mux_setup()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:28:04.132Z

Reserved: 2026-05-01T14:12:55.992Z

Link: CVE-2026-43196

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:38.607

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43196

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T16:45:07Z

Weaknesses