VYPR
High severity7.1NVD Advisory· Published Mar 25, 2026· Updated Apr 23, 2026

CVE-2026-23318

CVE-2026-23318

Description

In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Use correct version for UAC3 header validation

The entry of the validators table for UAC3 AC header descriptor is defined with the wrong protocol version UAC_VERSION_2, while it should have been UAC_VERSION_3. This results in the validator never matching for actual UAC3 devices (protocol == UAC_VERSION_3), causing their header descriptors to bypass validation entirely. A malicious USB device presenting a truncated UAC3 header could exploit this to cause out-of-bounds reads when the driver later accesses unvalidated descriptor fields.

The bug was introduced in the same commit as the recently fixed UAC3 feature unit sub-type typo, and appears to be from the same copy-paste error when the UAC3 section was created from the UAC2 section.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A copy-paste error in the Linux kernel's ALSA USB-audio driver causes UAC3 header validation to use the wrong protocol version, allowing malicious USB devices to bypass validation and trigger out-of-bounds reads.

Vulnerability

Overview

A copy-paste error in the Linux kernel's ALSA USB-audio driver causes the UAC3 AC header descriptor validator to use the wrong protocol version (UAC_VERSION_2 instead of UAC_VERSION_3). This means the validator never matches actual UAC3 devices (which use UAC_VERSION_3), so their header descriptors bypass validation entirely. The bug was introduced in the same commit as a recently fixed UAC3 feature unit sub-type typo, suggesting it originated when the UAC3 section was created from the UAC2 section [1][2][3][4].

Exploitation

An attacker with physical access or the ability to connect a malicious USB device can exploit this by presenting a truncated UAC3 header. Because the validator never fires for UAC3 devices, the driver will accept the malformed descriptor without checking its size or fields. When the driver later accesses fields in that unvalidated descriptor, it can read beyond the allocated buffer, leading to out-of-bounds reads [1][2][3][4].

Impact

Successful exploitation allows an attacker to cause the kernel to read out-of-bounds memory, potentially leaking sensitive information or leading to a system crash (denial of service). The vulnerability is rated High with a CVSS v3 score of 7.1, reflecting the need for physical access or a malicious USB device but the potential for significant information disclosure or system instability [1][2][3][4].

Mitigation

The fix corrects the protocol version in the validator table entry from UAC_VERSION_2 to UAC_VERSION_3. The patch has been applied to the stable kernel tree and is available in the referenced commits. Users should update their kernels to include this fix. No workaround is available other than applying the patch or avoiding untrusted USB audio devices [1][2][3][4].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

10
  • Linux/Kernel9 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 8 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=4.19.84,<4.20
    • cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.