CVE-2026-23191
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
14/02/2026
Last modified:
03/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ALSA: aloop: Fix racy access at PCM trigger<br />
<br />
The PCM trigger callback of aloop driver tries to check the PCM state<br />
and stop the stream of the tied substream in the corresponding cable.<br />
Since both check and stop operations are performed outside the cable<br />
lock, this may result in UAF when a program attempts to trigger<br />
frequently while opening/closing the tied stream, as spotted by<br />
fuzzers.<br />
<br />
For addressing the UAF, this patch changes two things:<br />
- It covers the most of code in loopback_check_format() with<br />
cable->lock spinlock, and add the proper NULL checks. This avoids<br />
already some racy accesses.<br />
- In addition, now we try to check the state of the capture PCM stream<br />
that may be stopped in this function, which was the major pain point<br />
leading to UAF.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.37 (including) | 6.12.70 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



