CVE-2026-23318 PUBLISHED

ALSA: usb-audio: Use correct version for UAC3 header validation

Assigner: Linux
Reserved: 13.01.2026 Published: 25.03.2026 Updated: 25.03.2026

In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Use correct version for UAC3 header validation

The entry of the validators table for UAC3 AC header descriptor is defined with the wrong protocol version UAC_VERSION_2, while it should have been UAC_VERSION_3. This results in the validator never matching for actual UAC3 devices (protocol == UAC_VERSION_3), causing their header descriptors to bypass validation entirely. A malicious USB device presenting a truncated UAC3 header could exploit this to cause out-of-bounds reads when the driver later accesses unvalidated descriptor fields.

The bug was introduced in the same commit as the recently fixed UAC3 feature unit sub-type typo, and appears to be from the same copy-paste error when the UAC3 section was created from the UAC2 section.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 57f8770620e9b51c61089751f0b5ad3dbe376ff2 to 0dcd1ed96c03459cf14706885c9dd3c1fd8bd29f (excl.)
  • affected from 57f8770620e9b51c61089751f0b5ad3dbe376ff2 to a0c6ae2ea84528f198bf7fd0117f12fd0cf6d7cc (excl.)
  • affected from 57f8770620e9b51c61089751f0b5ad3dbe376ff2 to d3904ca40515272681ae61ad6f561c24f190957f (excl.)
  • affected from 57f8770620e9b51c61089751f0b5ad3dbe376ff2 to 1e5753ff4c2e86aa88516f97a224c90a3d0b133e (excl.)
  • affected from 57f8770620e9b51c61089751f0b5ad3dbe376ff2 to 499ffd15b00dc91ac95c28f76959dfb5cdcc84d5 (excl.)
  • affected from 57f8770620e9b51c61089751f0b5ad3dbe376ff2 to 54f9d645a5453d0bfece0c465d34aaf072ea99fa (excl.)
  • Version 17821e2fb16752f5d363fb5c3f8aab4df41b9bcc is affected
  • Version bf74a46aebb1b5ab5e5f25bafa4ae0a453ba813a is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 5.4 is affected
  • unaffected from 0 to 5.4 (excl.)
  • unaffected from 6.1.167 to 6.1.* (incl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.77 to 6.12.* (incl.)
  • unaffected from 6.18.17 to 6.18.* (incl.)
  • unaffected from 6.19.7 to 6.19.* (incl.)
  • unaffected from 7.0-rc2 to * (incl.)

References