Impact
The vulnerability resides in the ALSA 6fire driver of the Linux kernel, where a use‑after‑free occurs during device disconnect. The bug allows the driver to write to freed memory after the ALSA card and its chip structure are released, which can corrupt kernel memory. An attacker could potentially exploit this to gain kernel‑level execution privileges or cause a system crash, affecting confidentiality, integrity, and availability.
Affected Systems
The flaw affects any Linux kernel installation that includes the ALSA 6fire USB audio driver prior to the commit that moves the card lifecycle out of usb6fire_chip_abort. No specific kernel version is listed, so all affected kernel releases that contain the unpatched driver are implicated.
Risk and Exploitability
The CVSS score of 7.8 rates the issue as high impact, while the EPSS score of less than 1 % indicates a low likelihood of widespread exploitation at present. The vulnerability is not yet listed in CISA’s KEV catalog. Exploitation would most likely require physical or local access to the USB audio device, or the ability to cause a disconnect event, making it a local or device‑based attack vector.
OpenCVE Enrichment
Debian DSA