CVE-2026-23078

Source
https://cve.org/CVERecord?id=CVE-2026-23078
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23078.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23078
Downstream
Related
Published
2026-02-04T16:08:03.283Z
Modified
2026-03-24T08:59:21.998735Z
Summary
ALSA: scarlett2: Fix buffer overflow in config retrieval
Details

In the Linux kernel, the following vulnerability has been resolved:

ALSA: scarlett2: Fix buffer overflow in config retrieval

The scarlett2usbget_config() function has a logic error in the endianness conversion code that can cause buffer overflows when count > 1.

The code checks if (size == 2) where size is the total buffer size in bytes, then loops count times treating each element as u16 (2 bytes). This causes the loop to access count * 2 bytes when the buffer only has size bytes allocated.

Fix by checking the element size (config_item->size) instead of the total buffer size. This ensures the endianness conversion matches the actual element type.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23078.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ac34df733d2dfe3b553897a1e9e1a44414f09834
Fixed
d5e80d1f97ae55bcea1426f551e4419245b41b9c
Fixed
51049f6e3f05d70660e2458ad3bb302a3721b751
Fixed
91a756d22f0482eac5bedb113c8922f90b254449
Fixed
27049f50be9f5ae3a62d272128ce0b381cb26a24
Fixed
31a3eba5c265a763260976674a22851e83128f6d
Fixed
6f5c69f72e50d51be3a8c028ae7eda42c82902cb

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23078.json"