Bluetooth: btusb: clamp SCO altsetting table indices
Summary
| CVE | CVE-2026-31497 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:47 UTC |
| Updated | 2026-04-22 14:16:47 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btusb: clamp SCO altsetting table indices
btusb_work() maps the number of active SCO links to USB alternate
settings through a three-entry lookup table when CVSD traffic uses
transparent voice settings. The lookup currently indexes alts[] with
data->sco_num - 1 without first constraining sco_num to the number of
available table entries.
While the table only defines alternate settings for up to three SCO
links, data->sco_num comes from hci_conn_num() and is used directly.
Cap the lookup to the last table entry before indexing it so the
driver keeps selecting the highest supported alternate setting without
reading past alts[]. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected baac6276c0a9f36f1fe1f00590ef00d2ba5ba626 312c4450fe23014665c163f480edd5ad2e27bbb8 git |
Not specified |
| CNA |
Linux |
Linux |
affected baac6276c0a9f36f1fe1f00590ef00d2ba5ba626 9dd13a8641de79bc1bc93da55cdd35259a002683 git |
Not specified |
| CNA |
Linux |
Linux |
affected baac6276c0a9f36f1fe1f00590ef00d2ba5ba626 476c9262b430c38c6a701a3b8176a3f48689085b git |
Not specified |
| CNA |
Linux |
Linux |
affected baac6276c0a9f36f1fe1f00590ef00d2ba5ba626 6fba3c3d48c927e55611a0f5ea34da88138ed0ff git |
Not specified |
| CNA |
Linux |
Linux |
affected baac6276c0a9f36f1fe1f00590ef00d2ba5ba626 834cf890d2c3d29cbfa1ee2376c40469c28ec297 git |
Not specified |
| CNA |
Linux |
Linux |
affected baac6276c0a9f36f1fe1f00590ef00d2ba5ba626 1019028eb124564cf7bca58a16f1df8a1ca30726 git |
Not specified |
| CNA |
Linux |
Linux |
affected baac6276c0a9f36f1fe1f00590ef00d2ba5ba626 21c254202f9d78abe0fcd642a92966deb92bd226 git |
Not specified |
| CNA |
Linux |
Linux |
affected baac6276c0a9f36f1fe1f00590ef00d2ba5ba626 129fa608b6ad08b8ab7178eeb2ec272c993aaccc git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.8 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.8 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10.253 5.10.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.203 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.168 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.131 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.80 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.21 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.11 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/9dd13a8641de79bc1bc93da55cdd35259a002683 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/129fa608b6ad08b8ab7178eeb2ec272c993aaccc |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/312c4450fe23014665c163f480edd5ad2e27bbb8 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/834cf890d2c3d29cbfa1ee2376c40469c28ec297 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/21c254202f9d78abe0fcd642a92966deb92bd226 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/1019028eb124564cf7bca58a16f1df8a1ca30726 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/6fba3c3d48c927e55611a0f5ea34da88138ed0ff |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/476c9262b430c38c6a701a3b8176a3f48689085b |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.