CVE-2026-31576

HIGH

media: hackrf: fix to not free memory after the device is registered in hackrf_probe()

Title source: cna
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: media: hackrf: fix to not free memory after the device is registered in hackrf_probe() In hackrf driver, the following race condition occurs: ``` CPU0 CPU1 hackrf_probe() kzalloc(); // alloc hackrf_dev .... v4l2_device_register(); .... fd = sys_open("/path/to/dev"); // open hackrf fd .... v4l2_device_unregister(); .... kfree(); // free hackrf_dev .... sys_ioctl(fd, ...); v4l2_ioctl(); video_is_registered() // UAF!! .... sys_close(fd); v4l2_release() // UAF!! hackrf_video_release() kfree(); // DFB!! ``` When a V4L2 or video device is unregistered, the device node is removed so new open() calls are blocked. However, file descriptors that are already open-and any in-flight I/O-do not terminate immediately; they remain valid until the last reference is dropped and the driver's release() is invoked. Therefore, freeing device memory on the error path after hackrf_probe() has registered dev it will lead to a race to use-after-free vuln, since those already-open handles haven't been released yet. And since release() free memory too, race to use-after-free and double-free vuln occur. To prevent this, if device is registered from probe(), it should be modified to free memory only through release() rather than calling kfree() directly.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 2.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-416
Status published
Products (19)
Linux/Linux < 4.4
Linux/Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 07e9e674b6146b1f6fc41b1f54b8968bf2802824
Linux/Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 2145c71a8044362e82e9923f001ba2aeb771b848
Linux/Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 98a0a81ce78020c2522e0046f49d200de9778cb9
Linux/Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - fcd1d70792a35c8a97414fe429f48311e41269c2
Linux/Linux 4.4
Linux/Linux 6.12.83 - 6.12.*
Linux/Linux 6.18.24 - 6.18.*
Linux/Linux 6.19.14 - 6.19.*
Linux/Linux 6.6.136 - 6.6.*
... and 9 more
Published Apr 24, 2026
Tracked Since Apr 24, 2026