CVE-2026-43095
Awaiting Analysis Awaiting Analysis - Queue
ASoC SDCA IRQ Cleanup Flaw in Linux Kernel

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: SDCA: Fix errors in IRQ cleanup IRQs are enabled through sdca_irq_populate() from component probe using devm_request_threaded_irq(), this however means the IRQs can persist if the sound card is torn down. Some of the IRQ handlers store references to the card and the kcontrols which can then fail. Some detail of the crash was explained in [1]. Generally it is not advised to use devm outside of bus probe, so the code is updated to not use devm. The IRQ requests are not moved to bus probe time as it makes passing the snd_soc_component into the IRQs very awkward and would the require a second step once the component is available, so it is simpler to just register the IRQs at this point, even though that necessitates some manual cleanup.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's ASoC SDCA component related to IRQ (Interrupt Request) cleanup. IRQs are enabled using devm_request_threaded_irq() during component probe, but this can cause IRQs to persist even after the sound card is torn down. Some IRQ handlers keep references to the sound card and its controls, which can lead to failures or crashes when those references become invalid.

The root cause is the improper cleanup of IRQs because devm (device managed) is used outside of the bus probe context, which is not recommended. The fix involves removing the use of devm for IRQ requests and instead manually registering and cleaning up IRQs to ensure proper handling and avoid crashes.


How can this vulnerability impact me? :

This vulnerability can cause system instability or crashes related to the sound card subsystem in the Linux kernel. Specifically, if IRQs are not properly cleaned up when a sound card is removed, the system may attempt to access invalid references, leading to failures or kernel crashes.


What immediate steps should I take to mitigate this vulnerability?

This vulnerability involves improper cleanup of IRQs in the Linux kernel's ASoC SDCA component, which can cause crashes due to lingering IRQ handlers referencing torn down sound card components.

To mitigate this vulnerability, update your Linux kernel to a version where this issue is fixed, as the patch removes the use of devm_request_threaded_irq() and implements manual IRQ cleanup to prevent IRQs from persisting after the sound card is torn down.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart