VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2025-40344

CVE-2025-40344

Description

In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: avs: Disable periods-elapsed work when closing PCM

avs_dai_fe_shutdown() handles the shutdown procedure for HOST HDAudio stream while period-elapsed work services its IRQs. As the former frees the DAI's private context, these two operations shall be synchronized to avoid slab-use-after-free or worse errors.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's ASoC Intel AVS driver, a use-after-free occurs during PCM close due to unsynchronized period-elapsed workqueue and shutdown handler.

Vulnerability

In the Linux kernel's ASoC Intel AVS (AudioDSP) driver, a use-after-free vulnerability exists in the PCM close path. The function avs_dai_fe_shutdown() handles the shutdown procedure for HOST HDAudio streams and frees the DAI's private context. However, a period-elapsed workqueue that services IRQs may still be running concurrently, accessing the freed memory. This race condition can lead to slab-use-after-free errors.

Exploitation

An attacker with local access to the system can trigger this vulnerability by opening and closing a PCM audio stream while audio operations are being performed. No special privileges are required beyond the ability to interact with ALSA audio devices. The race condition is time-sensitive and may require repeated attempts to trigger, but it is exploitable from user space.

Impact

Successful exploitation of this use-after-free can cause memory corruption, leading to system instability, denial of service (crash), or potentially privilege escalation if an attacker can control the freed memory to execute arbitrary code. The vulnerability is rated with a moderate severity due to the requirement of local access and timing.

Mitigation

The issue has been fixed in the Linux kernel with commits [1], [2], and [3] applied to stable branches. Users should update their kernel to a version containing these patches. No workarounds are available; updating is the recommended action.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.