CVE-2026-31475 PUBLISHED

ASoC: sma1307: fix double free of devm_kzalloc() memory

Assigner: Linux
Reserved: 09.03.2026 Published: 22.04.2026 Updated: 22.04.2026

In the Linux kernel, the following vulnerability has been resolved:

ASoC: sma1307: fix double free of devm_kzalloc() memory

A previous change added NULL checks and cleanup for allocation failures in sma1307_setting_loaded().

However, the cleanup for mode_set entries is wrong. Those entries are allocated with devm_kzalloc(), so they are device-managed resources and must not be freed with kfree(). Manually freeing them in the error path can lead to a double free when devres later releases the same memory.

Drop the manual kfree() loop and let devres handle the cleanup.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 0ec6bd16705fe21d6429d6b8f7981eae2142bba8 to d472d1a52985211b92883bb64bbe710b45980190 (excl.)
  • affected from 0ec6bd16705fe21d6429d6b8f7981eae2142bba8 to 1a82c3272626db9006f4c2cad3adf2916417aed6 (excl.)
  • affected from 0ec6bd16705fe21d6429d6b8f7981eae2142bba8 to fe757092d2329c397ecb32f2bf68a5b1c4bd9193 (excl.)
  • Version f8434b8ba437d3f6cbcd9ffe8405bd16ed28fc5c is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.15 is affected
  • unaffected from 0 to 6.15 (excl.)
  • unaffected from 6.18.21 to 6.18.* (incl.)
  • unaffected from 6.19.11 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References