Impact
The ALSA caiaq driver in the Linux kernel fails to increment the reference count for the parent USB device, causing the card’s asynchronous free callback to access freed memory. The callback also attempts to reset the device during teardown, which can race with the disconnect process. This use‑after‑free vulnerability could allow a local attacker controlling a USB audio device to execute arbitrary code in kernel space, potentially escalating privileges.
Affected Systems
Linux kernels that include the ALSA caiaq driver are affected. No specific kernel versions are listed, so all current releases containing this driver are potentially vulnerable until the patch is included.
Risk and Exploitability
The vulnerability qualifies as a high‑severity use‑after‑free in the kernel, providing a locally exploitable path for privilege escalation. No EPSS score is available and the issue is not listed in the CISA KEV catalog. Exploitation would require a physical USB device and local attacker access, but once triggered, the impact could be complete system compromise. The CVSS score of 7.0 indicates a high severity.
OpenCVE Enrichment