Home

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: q6asm: drop DSP responses for closed data streams 'Commit a354f030dbce ("ASoC: qcom: q6asm: handle the responses after closing")' attempted to ignore DSP responses arriving after a stream had been closed. However, those responses were still handled, causing lockups. Fix this by unconditionally dropping all DSP responses associated with closed data streams.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-07 | Assigner Linux

Product status

Default status
unaffected

68fd8480bb7baaf361e983f75d8571f25e017c67 (git) before 3249251eac6081d5169ba09f2d9cca66ab0cab0d
affected

68fd8480bb7baaf361e983f75d8571f25e017c67 (git) before 8a066a81ee0c1b6cdbd81393536c3b2d19ccef25
affected

Default status
affected

4.18
affected

Any version before 4.18
unaffected

6.19.6 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/3249251eac6081d5169ba09f2d9cca66ab0cab0d

git.kernel.org/...c/8a066a81ee0c1b6cdbd81393536c3b2d19ccef25

cve.org (CVE-2026-43204)

nvd.nist.gov (CVE-2026-43204)

Download JSON