CVE-2026-23318
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
25/03/2026
Last modified:
23/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ALSA: usb-audio: Use correct version for UAC3 header validation<br />
<br />
The entry of the validators table for UAC3 AC header descriptor is<br />
defined with the wrong protocol version UAC_VERSION_2, while it should<br />
have been UAC_VERSION_3. This results in the validator never matching<br />
for actual UAC3 devices (protocol == UAC_VERSION_3), causing their<br />
header descriptors to bypass validation entirely. A malicious USB<br />
device presenting a truncated UAC3 header could exploit this to cause<br />
out-of-bounds reads when the driver later accesses unvalidated<br />
descriptor fields.<br />
<br />
The bug was introduced in the same commit as the recently fixed UAC3<br />
feature unit sub-type typo, and appears to be from the same copy-paste<br />
error when the UAC3 section was created from the UAC2 section.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.84 (including) | 4.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.3.11 (including) | 5.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.1 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.167 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.130 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.77 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0dcd1ed96c03459cf14706885c9dd3c1fd8bd29f
- https://git.kernel.org/stable/c/1e5753ff4c2e86aa88516f97a224c90a3d0b133e
- https://git.kernel.org/stable/c/499ffd15b00dc91ac95c28f76959dfb5cdcc84d5
- https://git.kernel.org/stable/c/54f9d645a5453d0bfece0c465d34aaf072ea99fa
- https://git.kernel.org/stable/c/82a7d0a1b88798de1a609130080ce0c65dd869e9
- https://git.kernel.org/stable/c/8307d93e63d5f54ef10412d4db2dd551e920dee4
- https://git.kernel.org/stable/c/a0c6ae2ea84528f198bf7fd0117f12fd0cf6d7cc
- https://git.kernel.org/stable/c/d3904ca40515272681ae61ad6f561c24f190957f



