7.3
CVE-2026-43459
- EPSS 0.01%
- Veröffentlicht 08.05.2026 14:22:22
- Zuletzt bearbeitet 12.05.2026 14:10:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
ASoC: soc-core: flush delayed work before removing DAIs and widgets
In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-core: flush delayed work before removing DAIs and widgets When a sound card is unbound while a PCM stream is open, a use-after-free can occur in snd_soc_dapm_stream_event(), called from the close_delayed_work workqueue handler. During unbind, snd_soc_unbind_card() flushes delayed work and then calls soc_cleanup_card_resources(). Inside cleanup, snd_card_disconnect_sync() releases all PCM file descriptors, and the resulting PCM close path can call snd_soc_dapm_stream_stop() which schedules new delayed work with a pmdown_time timer delay. Since this happens after the flush in snd_soc_unbind_card(), the new work is not caught. soc_remove_link_components() then frees DAPM widgets before this work fires, leading to the use-after-free. The existing flush in soc_free_pcm_runtime() also cannot help as it runs after soc_remove_link_components() has already freed the widgets. Add a flush in soc_cleanup_card_resources() after snd_card_disconnect_sync() (after which no new PCM closes can schedule further delayed work) and before soc_remove_link_dais() and soc_remove_link_components() (which tear down the structures the delayed work accesses).
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
e894efef9ac7c10b7727798dcc711cccf07569f9
Version <
bf80a89da97285d9b877e0c6995e870d46b8025c
Status
affected
Version
e894efef9ac7c10b7727798dcc711cccf07569f9
Version <
3887e514978d28216246360b46a9cb534969eb5a
Status
affected
Version
e894efef9ac7c10b7727798dcc711cccf07569f9
Version <
231568afbc0cd25b8fb2a94ebf9738eabe1cf007
Status
affected
Version
e894efef9ac7c10b7727798dcc711cccf07569f9
Version <
317a9298c54bb00319da73e5a7179f00e67fcbdf
Status
affected
Version
e894efef9ac7c10b7727798dcc711cccf07569f9
Version <
eab71e11ce2447c1e01809cbc11eab4234cf8dc8
Status
affected
Version
e894efef9ac7c10b7727798dcc711cccf07569f9
Version <
7d33e6140945482a07f8089ee86e13e02553ffdb
Status
affected
Version
e894efef9ac7c10b7727798dcc711cccf07569f9
Version <
c054f0607c8bb1b1aa529bc109e4149298a1cccd
Status
affected
Version
e894efef9ac7c10b7727798dcc711cccf07569f9
Version <
95bc5c225513fc3c4ce169563fb5e3929fbb938b
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.20
Status
affected
Version
0
Version <
4.20
Status
unaffected
Version <=
5.10.*
Version
5.10.253
Status
unaffected
Version <=
5.15.*
Version
5.15.203
Status
unaffected
Version <=
6.1.*
Version
6.1.167
Status
unaffected
Version <=
6.6.*
Version
6.6.130
Status
unaffected
Version <=
6.12.*
Version
6.12.78
Status
unaffected
Version <=
6.18.*
Version
6.18.19
Status
unaffected
Version <=
6.19.*
Version
6.19.9
Status
unaffected
Version <=
*
Version
7.0
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.018 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | 7.3 | 1.3 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|