CVE-2023-54308
Use-After-Free Vulnerability in Linux ALSA ymfpci Module Causes Kernel Oops
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 6.2.7 |
| linux | linux_kernel | 6.2.7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's ALSA ymfpci driver is due to improper resource management. The function snd_card_ymfpci_remove() was removed, but the call to snd_card_new() was not replaced with the device-managed snd_devm_card_new(). Because snd_card_free was no longer called, unloading the module could cause a kernel Oops (crash) due to a page fault when trying to access freed or invalid memory.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel Oops) when the affected ALSA ymfpci module is unloaded. This can lead to system instability or downtime, potentially affecting system availability and reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for Oops messages related to the ALSA ymfpci module, specifically looking for page fault errors when unloading the module. You can use the command 'dmesg | grep -i ymfpci' or 'journalctl -k | grep -i ymfpci' to check for such errors in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the ALSA ymfpci module uses device-managed APIs correctly, replacing snd_card_new() with snd_devm_card_new() to prevent the Oops on module unload. Until an update is applied, avoid unloading the ymfpci module to prevent kernel crashes.