CVE-2025-40344
Description
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: avs: Disable periods-elapsed work when closing PCM
avs_dai_fe_shutdown() handles the shutdown procedure for HOST HDAudio stream while period-elapsed work services its IRQs. As the former frees the DAI's private context, these two operations shall be synchronized to avoid slab-use-after-free or worse errors.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's ASoC Intel AVS driver, a use-after-free occurs during PCM close due to unsynchronized period-elapsed workqueue and shutdown handler.
Vulnerability
In the Linux kernel's ASoC Intel AVS (AudioDSP) driver, a use-after-free vulnerability exists in the PCM close path. The function avs_dai_fe_shutdown() handles the shutdown procedure for HOST HDAudio streams and frees the DAI's private context. However, a period-elapsed workqueue that services IRQs may still be running concurrently, accessing the freed memory. This race condition can lead to slab-use-after-free errors.
Exploitation
An attacker with local access to the system can trigger this vulnerability by opening and closing a PCM audio stream while audio operations are being performed. No special privileges are required beyond the ability to interact with ALSA audio devices. The race condition is time-sensitive and may require repeated attempts to trigger, but it is exploitable from user space.
Impact
Successful exploitation of this use-after-free can cause memory corruption, leading to system instability, denial of service (crash), or potentially privilege escalation if an attacker can control the freed memory to execute arbitrary code. The vulnerability is rated with a moderate severity due to the requirement of local access and timing.
Mitigation
The issue has been fixed in the Linux kernel with commits [1], [2], and [3] applied to stable branches. Users should update their kernel to a version containing these patches. No workarounds are available; updating is the recommended action.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
3ca6d2b7aca77b41fca4aa60b845f716dc5f3Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.