Impact
A double release of a pin controller resource in the cs42l43 driver can trigger a double free in kernel space. This flaw, classified as CWE‑1341 and CWE‑415, compromises kernel stability by causing an unrecoverable error in kernel memory management. The defect does not directly expose data but undermines the operational reliability of the affected host.
Affected Systems
The vulnerability affects Linux kernel versions 6.18 and 7.0 release candidates 1 through 7, as identified by the provided CPE strings. Any installation of the Linux kernel that includes the cirrus cs42l43 pin controller driver and has not incorporated the commit that removes the redundant release is at risk. Users should verify their kernel version against these affected releases to determine if remediation is required.
Risk and Exploitability
The EPSS score of less than 1% indicates a low probability of recent exploitation, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, because the flaw resides in kernel mode, an attacker with local or privilege‑escalation capabilities could trigger a crash that may disrupt availability. The CVSS score of 7.8 indicates high severity, and the potential for a kernel crash suggests significant impact if exploited.
OpenCVE Enrichment
Debian DSA