Description
In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: q6asm: drop DSP responses for closed data streams

'Commit a354f030dbce ("ASoC: qcom: q6asm: handle the responses
after closing")' attempted to ignore DSP responses arriving
after a stream had been closed.

However, those responses were still handled, causing lockups.

Fix this by unconditionally dropping all DSP responses associated with
closed data streams.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel ASoC Qualcomm q6asm driver, a flaw caused DSP responses to be processed even after an audio stream had been closed, resulting in kernel lockups. The driver failed to discard pending responses, leading to a state where the kernel waits indefinitely for an event that never arrives. This weakness is a classic example of a failure to check internal state before handling asynchronous responses (CWE‑665). The consequence is a denial of service that removes normal operation until the system is rebooted.

Affected Systems

The vulnerability impacts the Linux kernel’s qcom q6asm (ASoC) audio driver. No specific release numbers are listed, so any kernel version that includes the driver and predates the commit that unconditionally drops DSP responses may be affected.

Risk and Exploitability

No CVSS, EPSS or KEV data are supplied. The main impact is a disruptive lockup that can be triggered by closing an audio stream and allowing residual DSP responses to be processed. Based on the description, it is inferred that the attack can be carried out from a local or privileged context by manipulating stream state. The lack of an EPSS score means exploitation probability is currently unquantified, but the severe denial of service nature makes the risk high for systems where an attacker can influence audio stream handling.

Generated by OpenCVE AI on May 6, 2026 at 14:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the kernel to include commit a354f030dbce, which unconditionally discards DSP responses once a stream is closed.
  • If an immediate kernel upgrade is not possible, disable or unload the q6asm audio DSP driver via module removal or kernel configuration to prevent the lockup from occurring.
  • Implement monitoring to detect kernel lockups and trigger automated reboots, thereby restoring service after an attack or accidental trigger.

Generated by OpenCVE AI on May 6, 2026 at 14:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-665

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: q6asm: drop DSP responses for closed data streams 'Commit a354f030dbce ("ASoC: qcom: q6asm: handle the responses after closing")' attempted to ignore DSP responses arriving after a stream had been closed. However, those responses were still handled, causing lockups. Fix this by unconditionally dropping all DSP responses associated with closed data streams.
Title ASoC: qcom: q6asm: drop DSP responses for closed data streams
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:28:09.617Z

Reserved: 2026-05-01T14:12:55.992Z

Link: CVE-2026-43204

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:39.623

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43204

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T17:15:08Z

Weaknesses