Linux Kernel Bluetooth L2CAP: Validate PDU Length to Prevent OOB Read
CVE-2026-31512 Published on April 22, 2026
Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv()
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv()
l2cap_ecred_data_rcv() reads the SDU length field from skb->data using
get_unaligned_le16() without first verifying that skb contains at least
L2CAP_SDULEN_SIZE (2) bytes. When skb->len is less than 2, this reads
past the valid data in the skb.
The ERTM reassembly path correctly calls pskb_may_pull() before reading
the SDU length (l2cap_reassemble_sdu, L2CAP_SAR_START case). Apply the
same validation to the Enhanced Credit Based Flow Control data path.
Products Associated with CVE-2026-31512
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version aac23bf636593cc2d67144aed373a46a1a5f76b1 and below cef09691cfb61f6c91cc27c3d69634f81c8ab949 is affected.
- Version aac23bf636593cc2d67144aed373a46a1a5f76b1 and below 3340be2bafdcc806f048273ea6d8e82a6597aa1b is affected.
- Version aac23bf636593cc2d67144aed373a46a1a5f76b1 and below e47315b84d0eb188772c3ff5cf073cdbdefca6b4 is affected.
- Version aac23bf636593cc2d67144aed373a46a1a5f76b1 and below 477ad4976072056c348937e94f24583321938df4 is affected.
- Version aac23bf636593cc2d67144aed373a46a1a5f76b1 and below 40c7f7eea2f4d9cb0b3e924254c8c9053372168f is affected.
- Version aac23bf636593cc2d67144aed373a46a1a5f76b1 and below 8c96f3bd4ae0802db90630be8e9851827e9c9209 is affected.
- Version aac23bf636593cc2d67144aed373a46a1a5f76b1 and below 5ad981249be52f5e4e92e0e97b436b569071cb86 is affected.
- Version aac23bf636593cc2d67144aed373a46a1a5f76b1 and below c65bd945d1c08c3db756821b6bf9f1c4a77b29c6 is affected.
- Version 3.14 is affected.
- Before 3.14 is unaffected.
- Version 5.10.253, <= 5.10.* is unaffected.
- Version 5.15.203, <= 5.15.* is unaffected.
- Version 6.1.168, <= 6.1.* is unaffected.
- Version 6.6.131, <= 6.6.* is unaffected.
- Version 6.12.80, <= 6.12.* is unaffected.
- Version 6.18.21, <= 6.18.* is unaffected.
- Version 6.19.11, <= 6.19.* is unaffected.
- Version 7.0, <= * is unaffected.