Out-of-bounds read in Linux kernel - CVE-2026-31512
Published: April 24, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a remote attacker to disclose sensitive information.
The vulnerability exists due to an out-of-bounds read in l2cap_ecred_data_rcv() when processing a crafted L2CAP Enhanced Credit Based Flow Control data packet with less than 2 bytes of data. A remote attacker can send a specially crafted Bluetooth packet to disclose sensitive information.
How to mitigate CVE-2026-31512
Sources
- https://git.kernel.org/stable/c/3340be2bafdcc806f048273ea6d8e82a6597aa1b
- https://git.kernel.org/stable/c/40c7f7eea2f4d9cb0b3e924254c8c9053372168f
- https://git.kernel.org/stable/c/477ad4976072056c348937e94f24583321938df4
- https://git.kernel.org/stable/c/5ad981249be52f5e4e92e0e97b436b569071cb86
- https://git.kernel.org/stable/c/8c96f3bd4ae0802db90630be8e9851827e9c9209
- https://git.kernel.org/stable/c/c65bd945d1c08c3db756821b6bf9f1c4a77b29c6
- https://git.kernel.org/stable/c/cef09691cfb61f6c91cc27c3d69634f81c8ab949
- https://git.kernel.org/stable/c/e47315b84d0eb188772c3ff5cf073cdbdefca6b4