Impact
The vulnerability is a use‑after‑free in the Linux kernel ALSA USB audio subsystem. When mixer creation fails, the code frees memory that is still referenced by OSS mixer controls, causing an illegal read when the card is registered. This memory corruption can lead to a kernel crash, presenting a high‑severity local fault and a use‑after‑free weakness (CWE‑416).
Affected Systems
Any Linux system running the kernel with the affected ALSA USB audio driver, including all releases of Linux kernel 6.19 (rc1 through rc6) and other kernel versions that include the same ALSA code.
Risk and Exploitability
The CVSS score of 7.8 marks this as high severity. The EPSS score of less than 1% indicates a currently low likelihood of exploitation, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is inferred to be local, requiring a user with access to the affected system to connect a USB audio device or otherwise trigger the Mixer creation failure.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN