CVE-2026-43126
Linux Kernel ALSA OSS Mixer Use-After-Free Fix
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's ALSA OSS mixer layer. The issue arises because the mixer layer calls the kcontrol operations individually, and some pending calls might not be properly handled when the device is disconnecting. This can lead to use-after-free (UAF) scenarios. To fix this, sanity checks for card disconnection were added at each entry point of OSS mixer accesses, with a read-write semaphore (rwsem) taken before the check to ensure proper context coverage.
How can this vulnerability impact me? :
The vulnerability could lead to use-after-free conditions in the ALSA OSS mixer layer when a device is disconnected. This might cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service by exploiting the improper handling of device disconnection.