Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1771 articles · 103891 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-31393EXPLOITEDPATCHED
linux · linux kernel

Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access l2cap_information_rsp() checks that cmd_len covers the fixed l2cap_info_rsp header (type + result, 4 bytes) but then reads rsp->data without verifying that the payload is present: - L2CAP_IT_FEAT_MASK calls get_unaligned_le32(rsp->data), which reads 4 bytes past the header (needs cmd_len >= 8). - L2CAP_IT_FIXED_CHAN reads rsp->data[0], 1 byte past the header (needs cmd_len >= 5). A truncated L2CAP_INFO_RSP with result == L2CAP_IR_SUCCESS triggers an out-of-bounds read of adjacent skb data. Guard each data access with the required payload length check. If the payload is too short, skip the read and let the state machine complete with safe defaults (feat_mask and remote_fixed_chan remain zero from kzalloc), so the info timer cleanup and l2cap_conn_start() still run and the connection is not stalled.

Affected Products

VendorProductVersions
linuxlinux kernel4e8402a3f884427f9233ba436459c158d1f2e114, 4e8402a3f884427f9233ba436459c158d1f2e114, 4e8402a3f884427f9233ba436459c158d1f2e114, 4e8402a3f884427f9233ba436459c158d1f2e114, 4e8402a3f884427f9233ba436459c158d1f2e114, 4e8402a3f884427f9233ba436459c158d1f2e114, 2.6.24, 7.0-rc4

References

  • https://git.kernel.org/stable/c/3b646516cba2ebc4b51a72954903326e7c1e443f
  • https://git.kernel.org/stable/c/807bd1258453c4c83f6ae9dbc1e7b44860ff40d0
  • https://git.kernel.org/stable/c/9aeacde4da0f02d42fd968fd32f245828b230171
  • https://git.kernel.org/stable/c/e7ff754e339e3d5ce29aa9f95352d0186df8fbd9
  • https://git.kernel.org/stable/c/db2872d054e467810078e2b9f440a5b326a601b2
  • https://git.kernel.org/stable/c/dd815e6e3918dc75a49aaabac36e4f024d675101

Related News (2 articles)

Tier C
VulDB5h ago
CVE-2026-31393 | Linux Kernel up to 7.0-rc4 Bluetooth l2cap_information_rsp out-of-bounds
→ No new info (linked only)
Tier C
Linux Kernel CVEs5h ago
CVE-2026-31393: Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
3b646516cba2ebc4b51a72954903326e7c1e443f807bd1258453c4c83f6ae9dbc1e7b44860ff40d09aeacde4da0f02d42fd968fd32f245828b230171e7ff754e339e3d5ce29aa9f95352d0186df8fbd9db2872d054e467810078e2b9f440a5b326a601b2dd815e6e3918dc75a49aaabac36e4f024d67510106.1.1676.6.1306.12.786.18.206.19.107.0-rc5
PublishedApr 3, 2026
Last enriched4h agov2
Trending Score60
Source articles2
Independent2
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-31397EXP
mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd()
Trending: 60
CRITICALCVE-2026-23463EXP
soc: fsl: qbman: fix race condition in qman_destroy_fq
Trending: 60
CRITICALCVE-2026-23472EXP
serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN
Trending: 60
CRITICALCVE-2026-23438EXP
net: mvpp2: guard flow control update with global_tx_fc in buffer switching
Trending: 60
CRITICALCVE-2026-23449EXP
net/sched: teql: Fix double-free in teql_master_xmit
Trending: 60

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Patch Available
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Updated: severity, affectedVersions, activelyExploited
Apr 3, 2026

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated severity to CRITICAL, added affected version 7.0-rc4, and corrected exploit availability to false.

severityaffectedVersionsactivelyExploited
via VulDB
v15h ago

Initial creation