Impact
The vulnerability is a stack out‑of‑bounds read caused by an off‑by‑one error while copying an ALSA device shortname into a fixed 16‑byte buffer. The bug allows the kernel code to read past the end of the local stack buffer when processing a long or multibyte USB product name, exposing arbitrary stack contents to a local attacker. The exposed data may contain sensitive kernel information that could assist in further exploitation attempts.
Affected Systems
All Linux kernel versions that shipped before the fix were vulnerable, including the 2.6.31 series and the 3.x, 4.x, and 5.x release lines. The bug has been present since a 2009 commit and was only corrected in a later kernel release. Any system running an unpatched kernel that can enumerate USB audio devices with long product names is at risk.
Risk and Exploitability
The CVSS score is not publicly available, and the EPSS score is not listed, indicating low current exploitation probability. There are no known public exploits and the vulnerability is not included in the CISA KEV catalog. The likely attack vector involves manually connecting a crafted USB audio device to trigger the out‑of‑bounds read, which would result in a kernel fault or an information leak. Because the read is confined to kernel memory, remote code execution is not directly achievable without additional privilege‑escalation techniques.
OpenCVE Enrichment
Debian DLA
Debian DSA