CVE-2026-23318
Description
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Use correct version for UAC3 header validation
The entry of the validators table for UAC3 AC header descriptor is defined with the wrong protocol version UAC_VERSION_2, while it should have been UAC_VERSION_3. This results in the validator never matching for actual UAC3 devices (protocol == UAC_VERSION_3), causing their header descriptors to bypass validation entirely. A malicious USB device presenting a truncated UAC3 header could exploit this to cause out-of-bounds reads when the driver later accesses unvalidated descriptor fields.
The bug was introduced in the same commit as the recently fixed UAC3 feature unit sub-type typo, and appears to be from the same copy-paste error when the UAC3 section was created from the UAC2 section.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A copy-paste error in the Linux kernel's ALSA USB-audio driver causes UAC3 header validation to use the wrong protocol version, allowing malicious USB devices to bypass validation and trigger out-of-bounds reads.
Vulnerability
Overview
A copy-paste error in the Linux kernel's ALSA USB-audio driver causes the UAC3 AC header descriptor validator to use the wrong protocol version (UAC_VERSION_2 instead of UAC_VERSION_3). This means the validator never matches actual UAC3 devices (which use UAC_VERSION_3), so their header descriptors bypass validation entirely. The bug was introduced in the same commit as a recently fixed UAC3 feature unit sub-type typo, suggesting it originated when the UAC3 section was created from the UAC2 section [1][2][3][4].
Exploitation
An attacker with physical access or the ability to connect a malicious USB device can exploit this by presenting a truncated UAC3 header. Because the validator never fires for UAC3 devices, the driver will accept the malformed descriptor without checking its size or fields. When the driver later accesses fields in that unvalidated descriptor, it can read beyond the allocated buffer, leading to out-of-bounds reads [1][2][3][4].
Impact
Successful exploitation allows an attacker to cause the kernel to read out-of-bounds memory, potentially leaking sensitive information or leading to a system crash (denial of service). The vulnerability is rated High with a CVSS v3 score of 7.1, reflecting the need for physical access or a malicious USB device but the potential for significant information disclosure or system instability [1][2][3][4].
Mitigation
The fix corrects the protocol version in the validator table entry from UAC_VERSION_2 to UAC_VERSION_3. The patch has been applied to the stable kernel tree and is available in the referenced commits. Users should update their kernels to include this fix. No workaround is available other than applying the patch or avoiding untrusted USB audio devices [1][2][3][4].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
10cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 8 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=4.19.84,<4.20
- cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/0dcd1ed96c03459cf14706885c9dd3c1fd8bd29fnvdPatch
- git.kernel.org/stable/c/1e5753ff4c2e86aa88516f97a224c90a3d0b133envdPatch
- git.kernel.org/stable/c/499ffd15b00dc91ac95c28f76959dfb5cdcc84d5nvdPatch
- git.kernel.org/stable/c/54f9d645a5453d0bfece0c465d34aaf072ea99fanvdPatch
- git.kernel.org/stable/c/82a7d0a1b88798de1a609130080ce0c65dd869e9nvdPatch
- git.kernel.org/stable/c/8307d93e63d5f54ef10412d4db2dd551e920dee4nvdPatch
- git.kernel.org/stable/c/a0c6ae2ea84528f198bf7fd0117f12fd0cf6d7ccnvdPatch
- git.kernel.org/stable/c/d3904ca40515272681ae61ad6f561c24f190957fnvdPatch
News mentions
0No linked articles in our index yet.