CVE-2026-31759
Severity CVSS v4.0:
Pending analysis
Type:
CWE-415
Double Free
Publication date:
01/05/2026
Last modified:
08/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: ulpi: fix double free in ulpi_register_interface() error path<br />
<br />
When device_register() fails, ulpi_register() calls put_device() on<br />
ulpi->dev.<br />
<br />
The device release callback ulpi_dev_release() drops the OF node<br />
reference and frees ulpi, but the current error path in<br />
ulpi_register_interface() then calls kfree(ulpi) again, causing a<br />
double free.<br />
<br />
Let put_device() handle the cleanup through ulpi_dev_release() and<br />
avoid freeing ulpi again in ulpi_register_interface().
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.2 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/01af542392b5d41fd659d487015a71f627accce3
- https://git.kernel.org/stable/c/272a9b26c336a295e4e209157fed809706c1b1f7
- https://git.kernel.org/stable/c/2f70ba9dae13a190673cc3f9b4aad52179738f60
- https://git.kernel.org/stable/c/38c28fe25611099230f0965c925499bfcf46a795
- https://git.kernel.org/stable/c/8763f8317bb389aded32a32b08f6751cfff657d2
- https://git.kernel.org/stable/c/a6e5461f076c2ef63159f18e5cdbd30b50f0bc15
- https://git.kernel.org/stable/c/aaeae6533d77e6ed4def85baec01e2815ebbef61
- https://git.kernel.org/stable/c/ee248e6e941e4f2e634df2bd43e5f1ef810ab6df



