๐Ÿ” CVE Alert

CVE-2026-31475

UNKNOWN 0.0

ASoC: sma1307: fix double free of devm_kzalloc() memory

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ASoC: sma1307: fix double free of devm_kzalloc() memory A previous change added NULL checks and cleanup for allocation failures in sma1307_setting_loaded(). However, the cleanup for mode_set entries is wrong. Those entries are allocated with devm_kzalloc(), so they are device-managed resources and must not be freed with kfree(). Manually freeing them in the error path can lead to a double free when devres later releases the same memory. Drop the manual kfree() loop and let devres handle the cleanup.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
0ec6bd16705fe21d6429d6b8f7981eae2142bba8 < d472d1a52985211b92883bb64bbe710b45980190 0ec6bd16705fe21d6429d6b8f7981eae2142bba8 < 1a82c3272626db9006f4c2cad3adf2916417aed6 0ec6bd16705fe21d6429d6b8f7981eae2142bba8 < fe757092d2329c397ecb32f2bf68a5b1c4bd9193 f8434b8ba437d3f6cbcd9ffe8405bd16ed28fc5c
Linux / Linux
6.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d472d1a52985211b92883bb64bbe710b45980190 git.kernel.org: https://git.kernel.org/stable/c/1a82c3272626db9006f4c2cad3adf2916417aed6 git.kernel.org: https://git.kernel.org/stable/c/fe757092d2329c397ecb32f2bf68a5b1c4bd9193