Out-of-bounds read in Linux kernel - CVE-2026-31497
Published: April 24, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to an out-of-bounds read in the btusb driver SCO alternate setting lookup in btusb_work() when processing transparent voice settings with more than three active SCO links. A local user can trigger Bluetooth connection states that cause the driver to index past the end of the alts[] table to cause a denial of service.
How to mitigate CVE-2026-31497
Sources
- https://git.kernel.org/stable/c/1019028eb124564cf7bca58a16f1df8a1ca30726
- https://git.kernel.org/stable/c/129fa608b6ad08b8ab7178eeb2ec272c993aaccc
- https://git.kernel.org/stable/c/21c254202f9d78abe0fcd642a92966deb92bd226
- https://git.kernel.org/stable/c/312c4450fe23014665c163f480edd5ad2e27bbb8
- https://git.kernel.org/stable/c/476c9262b430c38c6a701a3b8176a3f48689085b
- https://git.kernel.org/stable/c/6fba3c3d48c927e55611a0f5ea34da88138ed0ff
- https://git.kernel.org/stable/c/834cf890d2c3d29cbfa1ee2376c40469c28ec297
- https://git.kernel.org/stable/c/9dd13a8641de79bc1bc93da55cdd35259a002683