Impact
A use‑after‑free occurs when a sound card is unbound while a PCM stream is still open, causing delayed work to reference freed DAPM widgets. This memory corruption can lead to a system crash or potentially allow an attacker to execute arbitrary code in kernel mode. The weakness is a classic use‑after‑free flaw, classified as CWE-416.
Affected Systems
The vulnerability affects the Linux kernel’s ALSA ASoC subsystem. No specific kernel releases are listed, so all distributions shipping a kernel that contains the vulnerable code are potentially impacted.
Risk and Exploitability
The CVSS score is 7.0, indicating a high severity. EPSS data is unavailable and the vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be local privileged, as the issue requires an attacker to unbind the sound card while a PCM stream is open—a capability normally restricted to kernel or root processes. The lack of publicly demonstrated exploitation nor an available exploit reduces the immediate risk, but the severity of a use‑after‑free in kernel space warrants a timely response.
OpenCVE Enrichment