Description
In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: clamp SCO altsetting table indices

btusb_work() maps the number of active SCO links to USB alternate
settings through a three-entry lookup table when CVSD traffic uses
transparent voice settings. The lookup currently indexes alts[] with
data->sco_num - 1 without first constraining sco_num to the number of
available table entries.

While the table only defines alternate settings for up to three SCO
links, data->sco_num comes from hci_conn_num() and is used directly.
Cap the lookup to the last table entry before indexing it so the
driver keeps selecting the highest supported alternate setting without
reading past alts[].
Published: 2026-04-22
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: Out-of-bounds array indexing in the btusb driver that can trigger a kernel crash or expose kernel data
Action: Apply Patch
AI Analysis

Impact

The Linux kernel Bluetooth driver btusb maps active SCO links to USB alternate settings via a small lookup table. When the number of active SCO links exceeds the size of that table, the code indexes beyond the array bounds without validation. This can lead to incorrect memory reads or, if an attacker supplies specially crafted input, a crash of the kernel, potentially allowing information disclosure or denial of service.

Affected Systems

All Linux kernel variants that ship the buggy btusb driver are affected. The problem exists before the patch was released; no specific version list is provided.

Risk and Exploitability

The advisory does not provide a CVSS score or EPSS value, but the lack of bounds checks makes the bug stable and exploitable. The likely attack vector is remote via Bluetooth: an attacker can connect a rogue device that initiates many SCO links to trigger the fault. The resulting kernel crash would render the system unavailable and could expose kernel memory contents.

Generated by OpenCVE AI on April 22, 2026 at 18:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check your distribution’s security advisories and install the latest Linux kernel update that contains the btusb patch.
  • If a kernel update cannot be applied immediately, disable platform Bluetooth services or unload the btusb module to prevent the vulnerability from being exercised.
  • Configure the system to block or limit creation of SCO links while using a patched kernel to reduce the risk of accidental overflow from legitimate devices.

Generated by OpenCVE AI on April 22, 2026 at 18:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1285
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 22 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: clamp SCO altsetting table indices btusb_work() maps the number of active SCO links to USB alternate settings through a three-entry lookup table when CVSD traffic uses transparent voice settings. The lookup currently indexes alts[] with data->sco_num - 1 without first constraining sco_num to the number of available table entries. While the table only defines alternate settings for up to three SCO links, data->sco_num comes from hci_conn_num() and is used directly. Cap the lookup to the last table entry before indexing it so the driver keeps selecting the highest supported alternate setting without reading past alts[].
Title Bluetooth: btusb: clamp SCO altsetting table indices
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-22T13:54:19.051Z

Reserved: 2026-03-09T15:48:24.102Z

Link: CVE-2026-31497

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-22T14:16:47.857

Modified: 2026-04-22T14:16:47.857

Link: CVE-2026-31497

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31497 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T19:45:25Z

Weaknesses