CVE-2026-31701 PUBLISHED

ALSA: caiaq: take a reference on the USB device in create_card()

Assigner: Linux
Reserved: 09.03.2026 Published: 01.05.2026 Updated: 01.05.2026

In the Linux kernel, the following vulnerability has been resolved:

ALSA: caiaq: take a reference on the USB device in create_card()

The caiaq driver stores a pointer to the parent USB device in cdev->chip.dev but never takes a reference on it. The card's private_free callback, snd_usb_caiaq_card_free(), can run asynchronously via snd_card_free_when_closed() after the USB device has already been disconnected and freed, so any access to cdev->chip.dev in that path dereferences a freed usb_device.

On top of the refcounting issue, the current card_free implementation calls usb_reset_device(cdev->chip.dev). A reset in a free callback is inappropriate: the device is going away, the call takes the device lock in a teardown context, and the reset races with the disconnect path that the callback is already cleaning up after.

Take a reference on the USB device in create_card() with usb_get_dev(), drop it with usb_put_dev() in the free callback, and remove the usb_reset_device() call.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 4507a8b9b30344c5ddd8219945f446d47e966a6d to f6634af5de728a46792f674a66d7843570cb68f7 (excl.)
  • affected from a3f9314752dbb6f6aa1f0f2b4c58243bda800738 to 1d9be95aee6c6246a21752e60c9519902649f482 (excl.)
  • affected from b04dcbb7f7b1908806b7dc22671cdbe78ff2b82c to 6473ed16df1fe88051140611b3eb9a49be7f429e (excl.)
  • affected from b04dcbb7f7b1908806b7dc22671cdbe78ff2b82c to 59b622a043cffc58b7638cd85ae6c30a0904f8e6 (excl.)
  • affected from b04dcbb7f7b1908806b7dc22671cdbe78ff2b82c to 80bb50e2d459213cccff3111d5ef98ed4238c0d5 (excl.)
  • Version 3993edf44d3df7b6e8c753eac6ac8783473fcbab is affected
  • Version ebad462eec93b0f701dfe4de98990e7355283801 is affected
  • Version 4dd821dcbfcecf7af6a08370b0b217cde2818acf is affected
  • Version cadf1d8e9ddcd74584ec961aeac14ac549b261d8 is affected
  • Version 237f3faf0177bdde728fa3106d730d806436aa4d is affected
  • Version dd0de8cb708951cebf727aa045e8242ba651bb52 is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.13 is affected
  • unaffected from 0 to 6.13 (excl.)
  • unaffected from 6.6.136 to 6.6.* (incl.)
  • unaffected from 6.12.84 to 6.12.* (incl.)
  • unaffected from 6.18.25 to 6.18.* (incl.)
  • unaffected from 7.0.2 to 7.0.* (incl.)
  • unaffected from 7.1-rc1 to * (incl.)

References