Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: soc: ti: pruss: Fix double free in pruss_clk_mux_setup() In the pruss_clk_mux_setup(), the devm_add_action_or_reset() indirectly calls pruss_of_free_clk_provider(), which calls of_node_put(clk_mux_np) on the error path. However, after the devm_add_action_or_reset() returns, the of_node_put(clk_mux_np) is called again, causing a double free. Fix by returning directly, to avoid the duplicate of_node_put().
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.10, < 5.10.252 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/04dbbb18cc9c8795c9ff47d8994bc03ebfef9d68Patch
- https://git.kernel.org/stable/c/24c40076e3bc3d73c839c886d6bda1da6c4d9b93Patch
- https://git.kernel.org/stable/c/69aa67c1e22d13e9aad4b08c86304ad8e743dcabPatch
- https://git.kernel.org/stable/c/80db65d4acfb9ff12d00172aed39ea8b98261aadPatch
- https://git.kernel.org/stable/c/818cf66d91c8ef09b01664a12d5f4ea786d64396Patch
- https://git.kernel.org/stable/c/b7db9953c2f8da37de498198623b05b46f8e2ca0Patch
- https://git.kernel.org/stable/c/dbda01bf2dfe5af33163e1e5fca1b82b619c2803Patch
- https://git.kernel.org/stable/c/e113339cc7d23be4948891f3a702e9dce5b47035Patch
FAQ
What is CVE-2026-43196?
CVE-2026-43196 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: soc: ti: pruss: Fix double free in pruss_clk_mux_setup() In the pruss_clk_mux_setup(), the devm_add_action_or_reset() indirectly c...
How severe is CVE-2026-43196?
CVE-2026-43196 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43196?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.