Description
In the Linux kernel, the following vulnerability has been resolved:

soc: ti: k3-socinfo: Fix regmap leak on probe failure

The mmio regmap allocated during probe is never freed.

Switch to using the device managed allocator so that the regmap is
released on probe failures (e.g. probe deferral) and on driver unbind.
Published: 2026-05-06
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A defect in the TI K3 SOC info driver for the Linux kernel fails to release a regmap that is allocated during driver probe. The memory and device resource associated with that regmap is never freed when the probe fails, creating a persistent leak. This leak can accumulate over repeated failures, potentially exhausting kernel memory or device‑register space and causing system instability or a denial of service. The weakness corresponds to improper resource management and is categorized as CWE‑772.

Affected Systems

All Linux kernel builds that include the TI K3 SOC info driver are susceptible, regardless of kernel version, until the vendor incorporates the fix. No specific product version boundary is listed; any kernel running the unpatched driver may be affected.

Risk and Exploitability

The vulnerability is local in nature: an attacker with privileged access can force multiple probe failures or trigger the driver’s probe routine to make the memory leak occur. Because the exploit requires kernel intervention rather than remote network access, the immediate threat level is moderate, but repeated use can degrade availability over time. The EPSS score is not available and the issue is not listed in the CISA KEV catalog, indicating no known active exploitation yet. The recommended remedy is to apply the kernel patch that switches to a device‑managed allocator so that regmaps are released automatically on failures or unbinding.

Generated by OpenCVE AI on May 7, 2026 at 02:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s upstream kernel patch that frees the regmap on probe failure
  • If the kernel cannot be updated immediately, rebuild the kernel with the backport of the hotfix or remove the K3 SOC info driver from the system
  • Configure an automated kernel update system to ensure timely installation of the latest kernel patches

Generated by OpenCVE AI on May 7, 2026 at 02:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 00:15:00 +0000


Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: soc: ti: k3-socinfo: Fix regmap leak on probe failure The mmio regmap allocated during probe is never freed. Switch to using the device managed allocator so that the regmap is released on probe failures (e.g. probe deferral) and on driver unbind.
Title soc: ti: k3-socinfo: Fix regmap leak on probe failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:28:35.614Z

Reserved: 2026-05-01T14:12:55.995Z

Link: CVE-2026-43242

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:44.590

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43242

cve-icon Redhat

Severity :

Publid Date: 2026-05-06T00:00:00Z

Links: CVE-2026-43242 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T02:45:06Z

Weaknesses