CVE-2026-23030

critical

Description

In the Linux kernel, the following vulnerability has been resolved: phy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe() The for_each_available_child_of_node() calls of_node_put() to release child_np in each success loop. After breaking from the loop with the child_np has been released, the code will jump to the put_child label and will call the of_node_put() again if the devm_request_threaded_irq() fails. These cause a double free bug. Fix by returning directly to avoid the duplicate of_node_put().

References

https://git.kernel.org/stable/c/efe92ee7a111fe0f4d75f3ed6b7e3f86322279d5

https://git.kernel.org/stable/c/ebae26dd15140b840cf65be5e1c0daee949ba70b

https://git.kernel.org/stable/c/e07dea3de508cd6950c937cec42de7603190e1ca

https://git.kernel.org/stable/c/027d42b97e6eb827c3438ebc09bab7efaee9270d

Details

Source: Mitre, NVD

Published: 2026-01-31

Updated: 2026-01-31

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.00018