CVE-2026-43204
Awaiting Analysis Awaiting Analysis - Queue
ASoC: q6asm DSP Response Handling Flaw in Linux Kernel

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: q6asm: drop DSP responses for closed data streams 'Commit a354f030dbce ("ASoC: qcom: q6asm: handle the responses after closing")' attempted to ignore DSP responses arriving after a stream had been closed. However, those responses were still handled, causing lockups. Fix this by unconditionally dropping all DSP responses associated with closed data streams.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
qualcomm q6asm *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel component related to Qualcomm's q6asm audio subsystem. It involves the handling of DSP (Digital Signal Processor) responses after a data stream has been closed. Although a previous commit attempted to ignore these late DSP responses, they were still processed, which could cause the system to lock up. The fix involves unconditionally dropping all DSP responses associated with closed data streams to prevent these lockups.


How can this vulnerability impact me? :

The vulnerability can cause the system to lock up due to the processing of DSP responses after a data stream has been closed. This can lead to system instability or crashes, potentially disrupting normal operation of devices using the affected Linux kernel component.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart