CVE-2026-43196

NameCVE-2026-43196
DescriptionIn the Linux kernel, the following vulnerability has been resolved: soc: ti: pruss: Fix double free in pruss_clk_mux_setup() In the pruss_clk_mux_setup(), the devm_add_action_or_reset() indirectly calls pruss_of_free_clk_provider(), which calls of_node_put(clk_mux_np) on the error path. However, after the devm_add_action_or_reset() returns, the of_node_put(clk_mux_np) is called again, causing a double free. Fix by returning directly, to avoid the duplicate of_node_put().
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye5.10.223-1vulnerable
bullseye (security)5.10.251-3vulnerable
bookworm6.1.159-1vulnerable
bookworm (security)6.1.170-1fixed
trixie6.12.73-1vulnerable
trixie (security)6.12.85-1fixed
forky6.19.14-1fixed
sid7.0.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcebookworm6.1.170-1
linuxsourcetrixie6.12.85-1
linuxsource(unstable)6.19.6-1

Notes

https://git.kernel.org/linus/80db65d4acfb9ff12d00172aed39ea8b98261aad (7.0-rc1)

Search for package or bug name: Reporting problems