CVE-2026-43459
Use-After-Free in Linux Kernel Sound Card Unbinding
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's ASoC (ALSA System on Chip) soc-core component related to sound card handling. Specifically, when a sound card is unbound while a PCM (Pulse Code Modulation) stream is still open, a use-after-free condition can happen in the function snd_soc_dapm_stream_event().
The issue arises because during the unbind process, delayed work is flushed before certain cleanup steps. However, after flushing, new delayed work can be scheduled due to PCM stream closure activities. Since this new work is not flushed, the system frees DAPM (Dynamic Audio Power Management) widgets before the delayed work executes, leading to use-after-free errors.
The fix involves adding an additional flush of delayed work after disconnecting PCM file descriptors and before removing link components and DAIs (Digital Audio Interfaces), ensuring no delayed work accesses freed structures.
How can this vulnerability impact me? :
This vulnerability can lead to a use-after-free condition in the Linux kernel's sound subsystem, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if exploited.
Since it involves kernel memory management errors, exploitation could compromise the security and reliability of systems using affected Linux kernel versions, especially those handling audio devices.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by applying a patch to the Linux kernel that adds a flush in soc_cleanup_card_resources() after snd_card_disconnect_sync() and before soc_remove_link_dais() and soc_remove_link_components().
Therefore, the immediate mitigation step is to update your Linux kernel to a version that includes this fix.