{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-43196","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-05-01T14:12:55.992Z","datePublished":"2026-05-06T11:28:04.132Z","dateUpdated":"2026-05-11T22:19:42.186Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:19:42.186Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: ti: pruss: Fix double free in pruss_clk_mux_setup()\n\nIn the pruss_clk_mux_setup(), the devm_add_action_or_reset() indirectly\ncalls pruss_of_free_clk_provider(), which calls of_node_put(clk_mux_np)\non the error path. However, after the devm_add_action_or_reset()\nreturns, the of_node_put(clk_mux_np) is called again, causing a double\nfree.\n\nFix by returning directly, to avoid the duplicate of_node_put()."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/soc/ti/pruss.c"],"versions":[{"version":"ba59c9b43c86b2c2396acac94e41d946cbaec9fe","lessThan":"dbda01bf2dfe5af33163e1e5fca1b82b619c2803","status":"affected","versionType":"git"},{"version":"ba59c9b43c86b2c2396acac94e41d946cbaec9fe","lessThan":"24c40076e3bc3d73c839c886d6bda1da6c4d9b93","status":"affected","versionType":"git"},{"version":"ba59c9b43c86b2c2396acac94e41d946cbaec9fe","lessThan":"818cf66d91c8ef09b01664a12d5f4ea786d64396","status":"affected","versionType":"git"},{"version":"ba59c9b43c86b2c2396acac94e41d946cbaec9fe","lessThan":"e113339cc7d23be4948891f3a702e9dce5b47035","status":"affected","versionType":"git"},{"version":"ba59c9b43c86b2c2396acac94e41d946cbaec9fe","lessThan":"69aa67c1e22d13e9aad4b08c86304ad8e743dcab","status":"affected","versionType":"git"},{"version":"ba59c9b43c86b2c2396acac94e41d946cbaec9fe","lessThan":"b7db9953c2f8da37de498198623b05b46f8e2ca0","status":"affected","versionType":"git"},{"version":"ba59c9b43c86b2c2396acac94e41d946cbaec9fe","lessThan":"04dbbb18cc9c8795c9ff47d8994bc03ebfef9d68","status":"affected","versionType":"git"},{"version":"ba59c9b43c86b2c2396acac94e41d946cbaec9fe","lessThan":"80db65d4acfb9ff12d00172aed39ea8b98261aad","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/soc/ti/pruss.c"],"versions":[{"version":"5.10","status":"affected"},{"version":"0","lessThan":"5.10","status":"unaffected","versionType":"semver"},{"version":"5.10.252","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.202","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.165","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.128","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.75","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.16","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.6","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.10.252"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.15.202"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.1.165"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.6.128"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.12.75"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.18.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.19.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"7.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/dbda01bf2dfe5af33163e1e5fca1b82b619c2803"},{"url":"https://git.kernel.org/stable/c/24c40076e3bc3d73c839c886d6bda1da6c4d9b93"},{"url":"https://git.kernel.org/stable/c/818cf66d91c8ef09b01664a12d5f4ea786d64396"},{"url":"https://git.kernel.org/stable/c/e113339cc7d23be4948891f3a702e9dce5b47035"},{"url":"https://git.kernel.org/stable/c/69aa67c1e22d13e9aad4b08c86304ad8e743dcab"},{"url":"https://git.kernel.org/stable/c/b7db9953c2f8da37de498198623b05b46f8e2ca0"},{"url":"https://git.kernel.org/stable/c/04dbbb18cc9c8795c9ff47d8994bc03ebfef9d68"},{"url":"https://git.kernel.org/stable/c/80db65d4acfb9ff12d00172aed39ea8b98261aad"}],"title":"soc: ti: pruss: Fix double free in pruss_clk_mux_setup()","x_generator":{"engine":"bippy-1.2.0"}}}}