Bug 2464426 (CVE-2026-31745) - CVE-2026-31745 kernel: reset: gpio: fix double free in reset_add_gpio_aux_device() error path
Summary: CVE-2026-31745 kernel: reset: gpio: fix double free in reset_add_gpio_aux_dev...
Keywords:
Status: NEW
Alias: CVE-2026-31745
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-01 15:06 UTC by OSIDB Bzimport
Modified: 2026-05-01 21:54 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-05-01 15:06:12 UTC
In the Linux kernel, the following vulnerability has been resolved:

reset: gpio: fix double free in reset_add_gpio_aux_device() error path

When __auxiliary_device_add() fails, reset_add_gpio_aux_device()
calls auxiliary_device_uninit(adev).

The device release callback reset_gpio_aux_device_release() frees
adev, but the current error path then calls kfree(adev) again,
causing a double free.

Keep kfree(adev) for the auxiliary_device_init() failure path, but
avoid freeing adev after auxiliary_device_uninit().


Note You need to log in before you can comment on or make changes to this bug.