CVE-2026-23191

Source
https://cve.org/CVERecord?id=CVE-2026-23191
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23191.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23191
Downstream
Related
Published
2026-02-14T16:27:18.882Z
Modified
2026-03-29T17:44:23.015292652Z
Summary
ALSA: aloop: Fix racy access at PCM trigger
Details

In the Linux kernel, the following vulnerability has been resolved:

ALSA: aloop: Fix racy access at PCM trigger

The PCM trigger callback of aloop driver tries to check the PCM state and stop the stream of the tied substream in the corresponding cable. Since both check and stop operations are performed outside the cable lock, this may result in UAF when a program attempts to trigger frequently while opening/closing the tied stream, as spotted by fuzzers.

For addressing the UAF, this patch changes two things: - It covers the most of code in loopbackcheckformat() with cable->lock spinlock, and add the proper NULL checks. This avoids already some racy accesses. - In addition, now we try to check the state of the capture PCM stream that may be stopped in this function, which was the major pain point leading to UAF.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23191.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b1c73fc8e697eb73e23603e465e9af2711ed4183
Fixed
bad15420050db1803767e58756114800cce91ea4
Fixed
5727ccf9d19ca414cb76d9b647883822e2789c2e
Fixed
826af7fa62e347464b1b4e0ba2fe19a92438084f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23191.json"