CVE-2026-31512
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/04/2026
Last modified:
28/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv()<br />
<br />
l2cap_ecred_data_rcv() reads the SDU length field from skb->data using<br />
get_unaligned_le16() without first verifying that skb contains at least<br />
L2CAP_SDULEN_SIZE (2) bytes. When skb->len is less than 2, this reads<br />
past the valid data in the skb.<br />
<br />
The ERTM reassembly path correctly calls pskb_may_pull() before reading<br />
the SDU length (l2cap_reassemble_sdu, L2CAP_SAR_START case). Apply the<br />
same validation to the Enhanced Credit Based Flow Control data path.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.14.1 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.131 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.80 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:3.14:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3340be2bafdcc806f048273ea6d8e82a6597aa1b
- https://git.kernel.org/stable/c/40c7f7eea2f4d9cb0b3e924254c8c9053372168f
- https://git.kernel.org/stable/c/477ad4976072056c348937e94f24583321938df4
- https://git.kernel.org/stable/c/5ad981249be52f5e4e92e0e97b436b569071cb86
- https://git.kernel.org/stable/c/8c96f3bd4ae0802db90630be8e9851827e9c9209
- https://git.kernel.org/stable/c/c65bd945d1c08c3db756821b6bf9f1c4a77b29c6
- https://git.kernel.org/stable/c/cef09691cfb61f6c91cc27c3d69634f81c8ab949
- https://git.kernel.org/stable/c/e47315b84d0eb188772c3ff5cf073cdbdefca6b4



