CVE-2026-43412
Kernel Crash in Linux ASoC qdsp6 Due to Improper Component Removal Order
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | linux_kernel | 6.19.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's ASoC (ALSA System on Chip) qcom qdsp6 driver. It occurs during the stop and start process of the ADSP (Audio DSP), where the kernel crashes due to the incorrect order in which ASoC components are removed.
Specifically, when the ADSP stops, the q6apm-audio .remove callback unloads topology and removes PCM runtimes during ASoC teardown. This action deletes the Runtime Data Structures (RTDs) that contain the q6apm DAI components before their removal pass runs. As a result, those components remain linked to the card, causing crashes on the next rebind.
The fix ensures that all dependent (child) components are removed first, and the q6apm component is removed last to prevent these crashes.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash during the stop and start process of the ADSP, leading to system instability or downtime.
Such crashes may disrupt audio processing or other functionalities relying on the affected ASoC components, potentially impacting device usability or causing unexpected reboots.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as kernel crashes during ADSP stop and start operations related to the q6apm component in the Linux kernel. Detection can be done by monitoring kernel logs for specific error messages indicating NULL pointer dereferences and crashes involving q6apm and related ASoC components.
- Check kernel logs for crash messages using: dmesg | grep -i 'q6apm'
- Look for NULL pointer dereference errors in kernel logs: dmesg | grep -i 'Unable to handle kernel NULL pointer dereference'
- Monitor for internal kernel errors (Oops) related to q6apm or ASoC: dmesg | grep -i 'Internal error: Oops'
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is caused by improper removal ordering of ASoC components during ADSP stop and start, leading to kernel crashes. Immediate mitigation involves updating the Linux kernel to a version where this issue is fixed, ensuring that the q6apm component is removed last after all dependent components.
If updating the kernel is not immediately possible, avoid stopping and starting the ADSP subsystem to prevent triggering the crash.