Impact
A double‑free bug exists in the PRUSS clock‑multiplexer setup routine of the Linux kernel. When an error occurs during device initialization, the code releases a device‑tree node reference twice, corrupting kernel memory. This corruption can lead to a kernel crash. The impact is confined to kernel space; user‑space applications are not directly affected.
Affected Systems
All Linux kernel builds that include the PRUSS driver and have not incorporated the fix are affected. Distributions running such kernels on hardware that enables the PRUSS subsystem are at risk. The impact is confined to kernel space; user‑space applications are not directly affected.
Risk and Exploitability
The vulnerability is a double‑free that corrupts kernel memory. No EPSS score or CVSS score is provided in the data, and the flaw is not listed in the CISA KEV catalog. Exploitation would likely require a local attacker capable of triggering the fault during PRUSS initialization or a scenario where the device can be controlled remotely. The principal risk is kernel memory corruption that could bring down the system.
OpenCVE Enrichment