CVE-2026-23089

NameCVE-2026-23089
DescriptionIn the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() When snd_usb_create_mixer() fails, snd_usb_mixer_free() frees mixer->id_elems but the controls already added to the card still reference the freed memory. Later when snd_card_register() runs, the OSS mixer layer calls their callbacks and hits a use-after-free read. Call trace: get_ctl_value+0x63f/0x820 sound/usb/mixer.c:411 get_min_max_with_quirks.isra.0+0x240/0x1f40 sound/usb/mixer.c:1241 mixer_ctl_feature_info+0x26b/0x490 sound/usb/mixer.c:1381 snd_mixer_oss_build_test+0x174/0x3a0 sound/core/oss/mixer_oss.c:887 ... snd_card_register+0x4ed/0x6d0 sound/core/init.c:923 usb_audio_probe+0x5ef/0x2a90 sound/usb/card.c:1025 Fix by calling snd_ctl_remove() for all mixer controls before freeing id_elems. We save the next pointer first because snd_ctl_remove() frees the current element.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4475-1, DLA-4476-1, DSA-6126-1, DSA-6127-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye5.10.223-1vulnerable
bullseye (security)5.10.249-1fixed
bookworm6.1.159-1vulnerable
bookworm (security)6.1.162-1fixed
trixie6.12.63-1vulnerable
trixie (security)6.12.73-1fixed
forky, sid6.18.12-1fixed
linux-6.1 (PTS)bullseye (security)6.1.162-1~deb11u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcebullseye5.10.249-1DLA-4475-1
linuxsourcebookworm6.1.162-1DSA-6127-1
linuxsourcetrixie6.12.69-1DSA-6126-1
linuxsource(unstable)6.18.8-1
linux-6.1sourcebullseye6.1.162-1~deb11u1DLA-4476-1

Notes

https://git.kernel.org/linus/930e69757b74c3ae083b0c3c7419bfe7f0edc7b2 (6.19-rc7)

Search for package or bug name: Reporting problems