๐Ÿ” CVE Alert

CVE-2026-31576

UNKNOWN 0.0

media: hackrf: fix to not free memory after the device is registered in hackrf_probe()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: media: hackrf: fix to not free memory after the device is registered in hackrf_probe() In hackrf driver, the following race condition occurs: ``` CPU0 CPU1 hackrf_probe() kzalloc(); // alloc hackrf_dev .... v4l2_device_register(); .... fd = sys_open("/path/to/dev"); // open hackrf fd .... v4l2_device_unregister(); .... kfree(); // free hackrf_dev .... sys_ioctl(fd, ...); v4l2_ioctl(); video_is_registered() // UAF!! .... sys_close(fd); v4l2_release() // UAF!! hackrf_video_release() kfree(); // DFB!! ``` When a V4L2 or video device is unregistered, the device node is removed so new open() calls are blocked. However, file descriptors that are already open-and any in-flight I/O-do not terminate immediately; they remain valid until the last reference is dropped and the driver's release() is invoked. Therefore, freeing device memory on the error path after hackrf_probe() has registered dev it will lead to a race to use-after-free vuln, since those already-open handles haven't been released yet. And since release() free memory too, race to use-after-free and double-free vuln occur. To prevent this, if device is registered from probe(), it should be modified to free memory only through release() rather than calling kfree() directly.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 98a0a81ce78020c2522e0046f49d200de9778cb9 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 07e9e674b6146b1f6fc41b1f54b8968bf2802824 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2145c71a8044362e82e9923f001ba2aeb771b848 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < fcd1d70792a35c8a97414fe429f48311e41269c2
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/98a0a81ce78020c2522e0046f49d200de9778cb9 git.kernel.org: https://git.kernel.org/stable/c/07e9e674b6146b1f6fc41b1f54b8968bf2802824 git.kernel.org: https://git.kernel.org/stable/c/2145c71a8044362e82e9923f001ba2aeb771b848 git.kernel.org: https://git.kernel.org/stable/c/fcd1d70792a35c8a97414fe429f48311e41269c2