In the Linux kernel, the following vulnerability has been resolved:
ASoC: sma1307: fix double free of devm_kzalloc() memory
A previous change added NULL checks and cleanup for allocation
failures in sma1307_setting_loaded().
However, the cleanup for mode_set entries is wrong. Those entries are
allocated with devm_kzalloc(), so they are device-managed resources and
must not be freed with kfree(). Manually freeing them in the error path
can lead to a double free when devres later releases the same memory.
Drop the manual kfree() loop and let devres handle the cleanup.
References
Configurations
Configuration 1 (hide)
|
History
27 Apr 2026, 23:25
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-415 | |
| References | () https://git.kernel.org/stable/c/1a82c3272626db9006f4c2cad3adf2916417aed6 - Patch | |
| References | () https://git.kernel.org/stable/c/d472d1a52985211b92883bb64bbe710b45980190 - Patch | |
| References | () https://git.kernel.org/stable/c/fe757092d2329c397ecb32f2bf68a5b1c4bd9193 - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* |
27 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
22 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 14:16
Updated : 2026-04-27 23:25
NVD link : CVE-2026-31475
Mitre link : CVE-2026-31475
CVE.ORG link : CVE-2026-31475
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free
