Description
In the Linux kernel, the following vulnerability has been resolved:

ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0

A malicious USB device with the TASCAM US-144MKII device id can have a
configuration containing bInterfaceNumber=1 but no interface 0. USB
configuration descriptors are not required to assign interface numbers
sequentially, so usb_ifnum_to_if(dev, 0) returns will NULL, which will
then be dereferenced directly.

Fix this up by checking the return value properly.
Published: 2026-04-24
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Kernel crash leading to denial of service
Action: Patch
AI Analysis

Impact

The vulnerability resides in the Linux kernel’s ALSA USB subsystem for the TASCAM US-144MKII device. When a device presents a configuration that declares interface 1 but omits interface 0, the kernel call usb_ifnum_to_if(dev, 0) returns NULL. This NULL pointer is dereferenced without a preceding validity check, causing a kernel panic. The resulting crash leads to a denial of service; no other impact such as privilege escalation is documented.

Affected Systems

All Linux kernels that include the ALSA USB driver prior to the patch commit are affected. The vendor is the Linux kernel (generic). No specific kernel version ranges are listed, so any kernel before the fix can be considered vulnerable.

Risk and Exploitability

The CVSS score of 4.6 indicates medium severity. The EPSS score of <1% shows exploitation probability is very low. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker must physically connect a malicious USB device to the target system to trigger the crash. The impact is a kernel panic resulting in a system reboot and loss of service; no privilege escalation is described.

Generated by OpenCVE AI on April 28, 2026 at 23:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the ALSA NULL deref fix (commit 09b145c1f1331c40dc955c0024d636f25417cddb or later).
  • If a kernel update is not immediately possible, block the problematic TASCAM device by adding a udev rule that rejects USB devices with the idVendor and idProduct corresponding to the TASCAM US-144MKII, or temporarily disable the ALSA USB driver for that device.
  • After applying the kernel update or patch, reboot the system to load the new kernel and ensure the issue is resolved.

Generated by OpenCVE AI on April 28, 2026 at 23:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Mon, 27 Apr 2026 11:30:00 +0000


Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0 A malicious USB device with the TASCAM US-144MKII device id can have a configuration containing bInterfaceNumber=1 but no interface 0. USB configuration descriptors are not required to assign interface numbers sequentially, so usb_ifnum_to_if(dev, 0) returns will NULL, which will then be dereferenced directly. Fix this up by checking the return value properly.
Title ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:12:19.891Z

Reserved: 2026-03-09T15:48:24.123Z

Link: CVE-2026-31620

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:41.280

Modified: 2026-04-28T14:11:42.397

Link: CVE-2026-31620

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31620 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T23:45:16Z

Weaknesses