7.3

CVE-2026-43459

ASoC: soc-core: flush delayed work before removing DAIs and widgets

In the Linux kernel, the following vulnerability has been resolved:

ASoC: soc-core: flush delayed work before removing DAIs and widgets

When a sound card is unbound while a PCM stream is open, a
use-after-free can occur in snd_soc_dapm_stream_event(), called from
the close_delayed_work workqueue handler.

During unbind, snd_soc_unbind_card() flushes delayed work and then
calls soc_cleanup_card_resources(). Inside cleanup,
snd_card_disconnect_sync() releases all PCM file descriptors, and
the resulting PCM close path can call snd_soc_dapm_stream_stop()
which schedules new delayed work with a pmdown_time timer delay.
Since this happens after the flush in snd_soc_unbind_card(), the
new work is not caught. soc_remove_link_components() then frees
DAPM widgets before this work fires, leading to the use-after-free.

The existing flush in soc_free_pcm_runtime() also cannot help as it
runs after soc_remove_link_components() has already freed the widgets.

Add a flush in soc_cleanup_card_resources() after
snd_card_disconnect_sync() (after which no new PCM closes can
schedule further delayed work) and before soc_remove_link_dais()
and soc_remove_link_components() (which tear down the structures the
delayed work accesses).
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version e894efef9ac7c10b7727798dcc711cccf07569f9
Version < bf80a89da97285d9b877e0c6995e870d46b8025c
Status affected
Version e894efef9ac7c10b7727798dcc711cccf07569f9
Version < 3887e514978d28216246360b46a9cb534969eb5a
Status affected
Version e894efef9ac7c10b7727798dcc711cccf07569f9
Version < 231568afbc0cd25b8fb2a94ebf9738eabe1cf007
Status affected
Version e894efef9ac7c10b7727798dcc711cccf07569f9
Version < 317a9298c54bb00319da73e5a7179f00e67fcbdf
Status affected
Version e894efef9ac7c10b7727798dcc711cccf07569f9
Version < eab71e11ce2447c1e01809cbc11eab4234cf8dc8
Status affected
Version e894efef9ac7c10b7727798dcc711cccf07569f9
Version < 7d33e6140945482a07f8089ee86e13e02553ffdb
Status affected
Version e894efef9ac7c10b7727798dcc711cccf07569f9
Version < c054f0607c8bb1b1aa529bc109e4149298a1cccd
Status affected
Version e894efef9ac7c10b7727798dcc711cccf07569f9
Version < 95bc5c225513fc3c4ce169563fb5e3929fbb938b
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.20
Status affected
Version 0
Version < 4.20
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.19
Status unaffected
Version <= 6.19.*
Version 6.19.9
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.018
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
416baaa9-dc9f-4396-8d5f-8c081fb06d67 7.3 1.3 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Es wurden noch keine Informationen zu CWE veröffentlicht.