ASoC: soc-core: flush delayed work before removing DAIs and widgets
Summary
| CVE | CVE-2026-43459 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-08 15:16:58 UTC |
| Updated | 2026-05-08 15:16:58 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-core: flush delayed work before removing DAIs and widgets When a sound card is unbound while a PCM stream is open, a use-after-free can occur in snd_soc_dapm_stream_event(), called from the close_delayed_work workqueue handler. During unbind, snd_soc_unbind_card() flushes delayed work and then calls soc_cleanup_card_resources(). Inside cleanup, snd_card_disconnect_sync() releases all PCM file descriptors, and the resulting PCM close path can call snd_soc_dapm_stream_stop() which schedules new delayed work with a pmdown_time timer delay. Since this happens after the flush in snd_soc_unbind_card(), the new work is not caught. soc_remove_link_components() then frees DAPM widgets before this work fires, leading to the use-after-free. The existing flush in soc_free_pcm_runtime() also cannot help as it runs after soc_remove_link_components() has already freed the widgets. Add a flush in soc_cleanup_card_resources() after snd_card_disconnect_sync() (after which no new PCM closes can schedule further delayed work) and before soc_remove_link_dais() and soc_remove_link_components() (which tear down the structures the delayed work accesses). |
Risk And Classification
EPSS: 0.000240000 probability, percentile 0.070400000 (date 2026-05-10)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected e894efef9ac7c10b7727798dcc711cccf07569f9 bf80a89da97285d9b877e0c6995e870d46b8025c git | Not specified |
| CNA | Linux | Linux | affected e894efef9ac7c10b7727798dcc711cccf07569f9 3887e514978d28216246360b46a9cb534969eb5a git | Not specified |
| CNA | Linux | Linux | affected e894efef9ac7c10b7727798dcc711cccf07569f9 231568afbc0cd25b8fb2a94ebf9738eabe1cf007 git | Not specified |
| CNA | Linux | Linux | affected e894efef9ac7c10b7727798dcc711cccf07569f9 317a9298c54bb00319da73e5a7179f00e67fcbdf git | Not specified |
| CNA | Linux | Linux | affected e894efef9ac7c10b7727798dcc711cccf07569f9 eab71e11ce2447c1e01809cbc11eab4234cf8dc8 git | Not specified |
| CNA | Linux | Linux | affected e894efef9ac7c10b7727798dcc711cccf07569f9 7d33e6140945482a07f8089ee86e13e02553ffdb git | Not specified |
| CNA | Linux | Linux | affected e894efef9ac7c10b7727798dcc711cccf07569f9 c054f0607c8bb1b1aa529bc109e4149298a1cccd git | Not specified |
| CNA | Linux | Linux | affected e894efef9ac7c10b7727798dcc711cccf07569f9 95bc5c225513fc3c4ce169563fb5e3929fbb938b git | Not specified |
| CNA | Linux | Linux | affected 4.20 | Not specified |
| CNA | Linux | Linux | unaffected 4.20 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.167 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.130 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.78 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.19 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.9 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/95bc5c225513fc3c4ce169563fb5e3929fbb938b | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/bf80a89da97285d9b877e0c6995e870d46b8025c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/7d33e6140945482a07f8089ee86e13e02553ffdb | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/231568afbc0cd25b8fb2a94ebf9738eabe1cf007 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/c054f0607c8bb1b1aa529bc109e4149298a1cccd | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/3887e514978d28216246360b46a9cb534969eb5a | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/eab71e11ce2447c1e01809cbc11eab4234cf8dc8 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/317a9298c54bb00319da73e5a7179f00e67fcbdf | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.