Resource exhaustion in Linux kernel - CVE-2026-31498
Published: April 24, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to improper resource management in the Bluetooth L2CAP ERTM implementation when processing configuration requests and segmenting user-supplied protocol data. A remote attacker can send specially crafted L2CAP configuration data to cause a denial of service.
The issue can be triggered during channel reconfiguration in the connected state, and a zero remote_mps value can lead to an infinite loop that exhausts available memory.
How to mitigate CVE-2026-31498
Sources
- https://git.kernel.org/stable/c/042e2cd4bb11e5313b19b87593616524949e4c52
- https://git.kernel.org/stable/c/25f420a0d4cfd61d3d23ec4b9c56d9f443d91377
- https://git.kernel.org/stable/c/52667c859fe33f70c2e711cb81bbd505d5eb8e75
- https://git.kernel.org/stable/c/900e4db5385ec2cacd372345a80ab9c8e105b3a3
- https://git.kernel.org/stable/c/9760b83cfd24b38caee663f429011a0dd6064fa9
- https://git.kernel.org/stable/c/9a21a631ee034b1573dce14b572a24943dbfd7ae
- https://git.kernel.org/stable/c/de37e2655b7abc3f59254c6b72256840f39fc6d5
- https://git.kernel.org/stable/c/e7aab23b7df89a3d754a5f0a7d2237548b328bd0