media: hackrf: fix to not free memory after the device is registered in hackrf_probe()
Summary
| CVE | CVE-2026-31576 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-24 15:16:32 UTC |
| Updated | 2026-04-27 20:40:20 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: media: hackrf: fix to not free memory after the device is registered in hackrf_probe() In hackrf driver, the following race condition occurs: ``` CPU0 CPU1 hackrf_probe() kzalloc(); // alloc hackrf_dev .... v4l2_device_register(); .... fd = sys_open("/path/to/dev"); // open hackrf fd .... v4l2_device_unregister(); .... kfree(); // free hackrf_dev .... sys_ioctl(fd, ...); v4l2_ioctl(); video_is_registered() // UAF!! .... sys_close(fd); v4l2_release() // UAF!! hackrf_video_release() kfree(); // DFB!! ``` When a V4L2 or video device is unregistered, the device node is removed so new open() calls are blocked. However, file descriptors that are already open-and any in-flight I/O-do not terminate immediately; they remain valid until the last reference is dropped and the driver's release() is invoked. Therefore, freeing device memory on the error path after hackrf_probe() has registered dev it will lead to a race to use-after-free vuln, since those already-open handles haven't been released yet. And since release() free memory too, race to use-after-free and double-free vuln occur. To prevent this, if device is registered from probe(), it should be modified to free memory only through release() rather than calling kfree() directly. |
Risk And Classification
Primary CVSS: v3.1 7.8 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.000180000 probability, percentile 0.048130000 (date 2026-04-27)
Problem Types: CWE-416
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 8bc4a9ed85046c214458c9e82aea75d2f46cfffd 45cbaf5c7cdc5386d86377f0daf94a17a007fed0 git | Not specified |
| CNA | Linux | Linux | affected 8bc4a9ed85046c214458c9e82aea75d2f46cfffd 98a0a81ce78020c2522e0046f49d200de9778cb9 git | Not specified |
| CNA | Linux | Linux | affected 8bc4a9ed85046c214458c9e82aea75d2f46cfffd 07e9e674b6146b1f6fc41b1f54b8968bf2802824 git | Not specified |
| CNA | Linux | Linux | affected 8bc4a9ed85046c214458c9e82aea75d2f46cfffd 2145c71a8044362e82e9923f001ba2aeb771b848 git | Not specified |
| CNA | Linux | Linux | affected 8bc4a9ed85046c214458c9e82aea75d2f46cfffd fcd1d70792a35c8a97414fe429f48311e41269c2 git | Not specified |
| CNA | Linux | Linux | affected 8bc4a9ed85046c214458c9e82aea75d2f46cfffd 3b7da2b4d0fe014eff181ed37e3bf832eb8ed258 git | Not specified |
| CNA | Linux | Linux | affected 4.4 | Not specified |
| CNA | Linux | Linux | unaffected 4.4 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.136 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.83 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.24 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.14 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0.1 7.0.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.1-rc1 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/98a0a81ce78020c2522e0046f49d200de9778cb9 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/2145c71a8044362e82e9923f001ba2aeb771b848 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/45cbaf5c7cdc5386d86377f0daf94a17a007fed0 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/07e9e674b6146b1f6fc41b1f54b8968bf2802824 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/fcd1d70792a35c8a97414fe429f48311e41269c2 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/3b7da2b4d0fe014eff181ed37e3bf832eb8ed258 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.