๐Ÿ” CVE Alert

CVE-2026-43437

UNKNOWN 0.0

ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain() In the drain loop, the local variable 'runtime' is reassigned to a linked stream's runtime (runtime = s->runtime at line 2157). After releasing the stream lock at line 2169, the code accesses runtime->no_period_wakeup, runtime->rate, and runtime->buffer_size (lines 2170-2178) โ€” all referencing the linked stream's runtime without any lock or refcount protecting its lifetime. A concurrent close() on the linked stream's fd triggers snd_pcm_release_substream() โ†’ snd_pcm_drop() โ†’ pcm_release_private() โ†’ snd_pcm_unlink() โ†’ snd_pcm_detach_substream() โ†’ kfree(runtime). No synchronization prevents kfree(runtime) from completing while the drain path dereferences the stale pointer. Fix by caching the needed runtime fields (no_period_wakeup, rate, buffer_size) into local variables while still holding the stream lock, and using the cached values after the lock is released.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 8, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f2b3614cefb61ee6046a0aaee503ee37f227d310 < 9baee36e8c5443411c4629afabafaff8a46a23fd f2b3614cefb61ee6046a0aaee503ee37f227d310 < fc71f888994569f87d5bee20b1ac6c9c1e3a7a79 f2b3614cefb61ee6046a0aaee503ee37f227d310 < 629cf09464cf98670996ea5c191dc9743e6f3f00 f2b3614cefb61ee6046a0aaee503ee37f227d310 < ae8f8d30d334bad5b1b3cdb1eb8a0b771f55e432 f2b3614cefb61ee6046a0aaee503ee37f227d310 < 4a758e9a1f5ed722f83c4dd35f867fe811553bcb f2b3614cefb61ee6046a0aaee503ee37f227d310 < c2f64e05a0587a83ec42dbd6b7a7ded79b2ff694 f2b3614cefb61ee6046a0aaee503ee37f227d310 < 9b1dbd69ba6f8f8c69bc7b77c2ce3b9c6ed05ba6
Linux / Linux
3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/9baee36e8c5443411c4629afabafaff8a46a23fd git.kernel.org: https://git.kernel.org/stable/c/fc71f888994569f87d5bee20b1ac6c9c1e3a7a79 git.kernel.org: https://git.kernel.org/stable/c/629cf09464cf98670996ea5c191dc9743e6f3f00 git.kernel.org: https://git.kernel.org/stable/c/ae8f8d30d334bad5b1b3cdb1eb8a0b771f55e432 git.kernel.org: https://git.kernel.org/stable/c/4a758e9a1f5ed722f83c4dd35f867fe811553bcb git.kernel.org: https://git.kernel.org/stable/c/c2f64e05a0587a83ec42dbd6b7a7ded79b2ff694 git.kernel.org: https://git.kernel.org/stable/c/9b1dbd69ba6f8f8c69bc7b77c2ce3b9c6ed05ba6