Impact
A logic error in the ALSA scarlett2 driver causes the endianness conversion loop to read twice as many bytes as the allocated buffer when the element size is not correctly checked, resulting in a classic buffer overflow (CWE‑787). This overflow could corrupt adjacent memory and, depending on the context, could allow an attacker to influence program flow or trigger a denial of service. The impact is restricted to systems that load the scarlett2_usb_get_config function while processing USB configuration data.
Affected Systems
The vulnerability is present in the Linux kernel for all releases that include the ALSA scarlett2 driver, notably kernel 6.19 rc1 through rc6 and prior to the commit that introduced the fix. Any workstation, server, or embedded device running the affected kernel and using a Scarlett 2 USB audio interface is potentially exposed. System administrators should inspect kernel version and confirm whether the device is in use.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity. The EPSS score is below 1 %, suggesting a low probability of widespread exploitation at present, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Attack access is likely local or requires the ability to influence USB configuration messages; the user must have sufficient privileges to load or communicate with the ALSA driver. Because the flaw originates from a mis‑rated loop, an attacker with code execution in kernel mode or the ability to manipulate USB device descriptors could trigger the overflow. The low EPSS score, however, implies moderate risk as exploitation would require specific conditions on the target system.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN