VYPR
High severity7.8NVD Advisory· Published May 8, 2026· Updated May 18, 2026

CVE-2026-43328

CVE-2026-43328

Description

In the Linux kernel, the following vulnerability has been resolved:

cpufreq: governor: fix double free in cpufreq_dbs_governor_init() error path

When kobject_init_and_add() fails, cpufreq_dbs_governor_init() calls kobject_put(&dbs_data->attr_set.kobj).

The kobject release callback cpufreq_dbs_data_release() calls gov->exit(dbs_data) and kfree(dbs_data), but the current error path then calls gov->exit(dbs_data) and kfree(dbs_data) again, causing a double free.

Keep the direct kfree(dbs_data) for the gov->init() failure path, but after kobject_init_and_add() has been called, let kobject_put() handle the cleanup through cpufreq_dbs_data_release().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Double-free vulnerability in Linux kernel cpufreq governor error path due to improper cleanup after kobject_init_and_add() failure.

A double-free vulnerability exists in the Linux kernel's cpufreq governor initialization code, specifically in the function cpufreq_dbs_governor_init(). When the call to kobject_init_and_add() fails, the error path first invokes kobject_put() on the kobject embedded in the dbs_data structure. This triggers the release callback cpufreq_dbs_data_release(), which frees dbs_data and calls the governor's exit function. Subsequently, the error path attempts to call gov->exit() and kfree(dbs_data) again, resulting in a double free [1].

To exploit this vulnerability, an attacker would need to cause a failure in the kobject registration process, which could be achieved by exhausting system resources or manipulating kernel parameters. The attack requires local access to the system and the ability to trigger the governor initialization error path.

The double free can lead to memory corruption, potentially enabling privilege escalation or a system crash. Given the CVSS score of 7.8, the vulnerability is considered high severity. The Linux kernel has issued a fix in commit da39ee627fd8 [1]. Users are advised to apply the patch or update to a kernel version containing the fix.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.