{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T12:41:02.407","vulnerabilities":[{"cve":{"id":"CVE-2026-23030","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2026-01-31T12:16:06.313","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nphy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe()\n\nThe for_each_available_child_of_node() calls of_node_put() to\nrelease child_np in each success loop. After breaking from the\nloop with the child_np has been released, the code will jump to\nthe put_child label and will call the of_node_put() again if the\ndevm_request_threaded_irq() fails. These cause a double free bug.\n\nFix by returning directly to avoid the duplicate of_node_put()."},{"lang":"es","value":"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nphy: rockchip: inno-usb2: Corrección de un error de doble liberación en rockchip_usb2phy_probe()\n\nLa función for_each_available_child_of_node() llama a of_node_put() para liberar child_np en cada bucle exitoso. Después de salir del bucle, una vez que child_np ha sido liberado, el código saltará a la etiqueta put_child y llamará a of_node_put() de nuevo si devm_request_threaded_irq() falla. Esto causa un error de doble liberación.\n\nSe corrige regresando directamente para evitar la llamada duplicada a of_node_put()."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/027d42b97e6eb827c3438ebc09bab7efaee9270d","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/b97b2c9808c9a97e0ce30216fa12096d8b0eaa75","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/e07dea3de508cd6950c937cec42de7603190e1ca","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/ebae26dd15140b840cf65be5e1c0daee949ba70b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/efe92ee7a111fe0f4d75f3ed6b7e3f86322279d5","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}