net: bcmasp: fix double free of WoL irq

Summary

CVECVE-2026-31506
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-04-22 14:16:49 UTC
Updated2026-04-22 14:16:49 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: net: bcmasp: fix double free of WoL irq We do not need to free wol_irq since it was instantiated with devm_request_irq(). So devres will free for us.

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected a2f0751206b03374f6d02f89c18a60f1bb238fea 121a6ad9cd42ba3bfc57deae93e3326515c2afe1 git Not specified
CNA Linux Linux affected a2f0751206b03374f6d02f89c18a60f1bb238fea 9e5f5c07cc7d66522f8c9676c28605eba5d4a20e git Not specified
CNA Linux Linux affected a2f0751206b03374f6d02f89c18a60f1bb238fea 8a30509ce6a29bdf18e0802383c524a7b2357ec0 git Not specified
CNA Linux Linux affected a2f0751206b03374f6d02f89c18a60f1bb238fea cbfa5be2bf64511d49b854a0f9fd6d0b5118621f git Not specified
CNA Linux Linux affected 6.6 Not specified
CNA Linux Linux unaffected 6.6 semver Not specified
CNA Linux Linux unaffected 6.12.80 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.21 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.11 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/9e5f5c07cc7d66522f8c9676c28605eba5d4a20e 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/121a6ad9cd42ba3bfc57deae93e3326515c2afe1 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/8a30509ce6a29bdf18e0802383c524a7b2357ec0 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/cbfa5be2bf64511d49b854a0f9fd6d0b5118621f 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report