Description
In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Check endpoint numbers at parsing Scarlett2 mixer interfaces

The Scarlett2 mixer quirk in USB-audio driver may hit a NULL
dereference when a malformed USB descriptor is passed, since it
assumes the presence of an endpoint in the parsed interface in
scarlett2_find_fc_interface(), as reported by fuzzer.

For avoiding the NULL dereference, just add the sanity check of
bNumEndpoints and skip the invalid interface.
Published: 2026-05-08
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A malformed USB descriptor can trigger a null pointer dereference in the ALSA USB‑audio driver when parsing the Scarlett2 mixer interface. The driver assumes an endpoint is always present, leading to a kernel crash if that assumption fails. This problem relates to improper validation of input data (CWE‑130), resulting in denial of service on the affected system.

Affected Systems

All Linux kernel releases that ship the ALSA USB‑audio driver with the Scarlett2 mixer quirk are affected. No specific version cutoff is given, so any installation that enables this quirk remains vulnerable until the endpoint number check is applied.

Risk and Exploitability

The CVSS score of 5.5 indicates medium severity, while an EPSS score of less than 1% reflects a low probability of widespread exploitation. The likely attack vector requires an attacker to supply a crafted USB audio device that can reach the target, typically through a local or compromised USB port. No public exploits have been documented and the vulnerability is not listed in CISA’s KEV catalog, but the kernel crash nature makes it attractive to actors with access to USB devices.

Generated by OpenCVE AI on May 9, 2026 at 15:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the patch adding a sanity check for bNumEndpoints before parsing Scarlett2 mixer interfaces.
  • If an immediate kernel upgrade is not possible, disable the Scarlett2 mixer quirk in the ALSA configuration or via module options to avoid the problematic code path.
  • Enforce USB device whitelisting or use a policy tool such as USBGuard to block unknown or untrusted USB audio devices, reducing the risk that a malicious descriptor can be presented to the vulnerable driver.

Generated by OpenCVE AI on May 9, 2026 at 15:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Sat, 09 May 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-130
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 08 May 2026 19:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Check endpoint numbers at parsing Scarlett2 mixer interfaces The Scarlett2 mixer quirk in USB-audio driver may hit a NULL dereference when a malformed USB descriptor is passed, since it assumes the presence of an endpoint in the parsed interface in scarlett2_find_fc_interface(), as reported by fuzzer. For avoiding the NULL dereference, just add the sanity check of bNumEndpoints and skip the invalid interface.
Title ALSA: usb-audio: Check endpoint numbers at parsing Scarlett2 mixer interfaces
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-09T04:10:59.504Z

Reserved: 2026-05-01T14:12:56.009Z

Link: CVE-2026-43436

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:55.930

Modified: 2026-05-08T15:16:55.930

Link: CVE-2026-43436

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43436 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T15:30:36Z

Weaknesses