CVE-2026-43437 PUBLISHED

ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain()

Assigner: Linux
Reserved: 01.05.2026 Published: 08.05.2026 Updated: 08.05.2026

In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain()

In the drain loop, the local variable 'runtime' is reassigned to a linked stream's runtime (runtime = s->runtime at line 2157). After releasing the stream lock at line 2169, the code accesses runtime->no_period_wakeup, runtime->rate, and runtime->buffer_size (lines 2170-2178) — all referencing the linked stream's runtime without any lock or refcount protecting its lifetime.

A concurrent close() on the linked stream's fd triggers snd_pcm_release_substream() → snd_pcm_drop() → pcm_release_private() → snd_pcm_unlink() → snd_pcm_detach_substream() → kfree(runtime). No synchronization prevents kfree(runtime) from completing while the drain path dereferences the stale pointer.

Fix by caching the needed runtime fields (no_period_wakeup, rate, buffer_size) into local variables while still holding the stream lock, and using the cached values after the lock is released.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from f2b3614cefb61ee6046a0aaee503ee37f227d310 to 9baee36e8c5443411c4629afabafaff8a46a23fd (excl.)
  • affected from f2b3614cefb61ee6046a0aaee503ee37f227d310 to fc71f888994569f87d5bee20b1ac6c9c1e3a7a79 (excl.)
  • affected from f2b3614cefb61ee6046a0aaee503ee37f227d310 to 629cf09464cf98670996ea5c191dc9743e6f3f00 (excl.)
  • affected from f2b3614cefb61ee6046a0aaee503ee37f227d310 to ae8f8d30d334bad5b1b3cdb1eb8a0b771f55e432 (excl.)
  • affected from f2b3614cefb61ee6046a0aaee503ee37f227d310 to 4a758e9a1f5ed722f83c4dd35f867fe811553bcb (excl.)
  • affected from f2b3614cefb61ee6046a0aaee503ee37f227d310 to c2f64e05a0587a83ec42dbd6b7a7ded79b2ff694 (excl.)
  • affected from f2b3614cefb61ee6046a0aaee503ee37f227d310 to 9b1dbd69ba6f8f8c69bc7b77c2ce3b9c6ed05ba6 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 3.0 is affected
  • unaffected from 0 to 3.0 (excl.)
  • unaffected from 5.10.253 to 5.10.* (incl.)
  • unaffected from 6.1.167 to 6.1.* (incl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.78 to 6.12.* (incl.)
  • unaffected from 6.18.19 to 6.18.* (incl.)
  • unaffected from 6.19.9 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References