In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Use correct version for UAC3 header validation
The entry of the validators table for UAC3 AC header descriptor is
defined with the wrong protocol version UAC_VERSION_2, while it should
have been UAC_VERSION_3. This results in the validator never matching
for actual UAC3 devices (protocol == UAC_VERSION_3), causing their
header descriptors to bypass validation entirely. A malicious USB
device presenting a truncated UAC3 header could exploit this to cause
out-of-bounds reads when the driver later accesses unvalidated
descriptor fields.
The bug was introduced in the same commit as the recently fixed UAC3
feature unit sub-type typo, and appears to be from the same copy-paste
error when the UAC3 section was created from the UAC2 section.
References
Configurations
Configuration 1 (hide)
|
History
23 Apr 2026, 21:05
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-125 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/0dcd1ed96c03459cf14706885c9dd3c1fd8bd29f - Patch | |
| References | () https://git.kernel.org/stable/c/1e5753ff4c2e86aa88516f97a224c90a3d0b133e - Patch | |
| References | () https://git.kernel.org/stable/c/499ffd15b00dc91ac95c28f76959dfb5cdcc84d5 - Patch | |
| References | () https://git.kernel.org/stable/c/54f9d645a5453d0bfece0c465d34aaf072ea99fa - Patch | |
| References | () https://git.kernel.org/stable/c/82a7d0a1b88798de1a609130080ce0c65dd869e9 - Patch | |
| References | () https://git.kernel.org/stable/c/8307d93e63d5f54ef10412d4db2dd551e920dee4 - Patch | |
| References | () https://git.kernel.org/stable/c/a0c6ae2ea84528f198bf7fd0117f12fd0cf6d7cc - Patch | |
| References | () https://git.kernel.org/stable/c/d3904ca40515272681ae61ad6f561c24f190957f - Patch |
18 Apr 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
25 Mar 2026, 11:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-25 11:16
Updated : 2026-04-23 21:05
NVD link : CVE-2026-23318
Mitre link : CVE-2026-23318
CVE.ORG link : CVE-2026-23318
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
