๐Ÿ” CVE Alert

CVE-2026-31745

UNKNOWN 0.0

reset: gpio: fix double free in reset_add_gpio_aux_device() error path

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: reset: gpio: fix double free in reset_add_gpio_aux_device() error path When __auxiliary_device_add() fails, reset_add_gpio_aux_device() calls auxiliary_device_uninit(adev). The device release callback reset_gpio_aux_device_release() frees adev, but the current error path then calls kfree(adev) again, causing a double free. Keep kfree(adev) for the auxiliary_device_init() failure path, but avoid freeing adev after auxiliary_device_uninit().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 1, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5fc4e4cf7a2268b5f73700fd1e8d02159f2417d8 < 1de465753220deb41569cf2add87bbb0673731db 5fc4e4cf7a2268b5f73700fd1e8d02159f2417d8 < fbffb8c7c7bb4d38e9f65e0bee446685011de5d8
Linux / Linux
6.19

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/1de465753220deb41569cf2add87bbb0673731db git.kernel.org: https://git.kernel.org/stable/c/fbffb8c7c7bb4d38e9f65e0bee446685011de5d8