{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-31720","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-03-09T15:48:24.134Z","datePublished":"2026-05-01T14:14:22.832Z","dateUpdated":"2026-05-11T22:14:27.286Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:14:27.286Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_uac1_legacy: validate control request size\n\nf_audio_complete() copies req->length bytes into a 4-byte stack\nvariable:\n\n  u32 data = 0;\n  memcpy(&data, req->buf, req->length);\n\nreq->length is derived from the host-controlled USB request path,\nwhich can lead to a stack out-of-bounds write.\n\nValidate req->actual against the expected payload size for the\nsupported control selectors and decode only the expected amount\nof data.\n\nThis avoids copying a host-influenced length into a fixed-size\nstack object."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/usb/gadget/function/f_uac1_legacy.c"],"versions":[{"version":"c6994e6f067cf0fc4c6cca3d164018b1150916f8","lessThan":"557d1d4e862eccd0b74cc377b66de3e1e8d49605","status":"affected","versionType":"git"},{"version":"c6994e6f067cf0fc4c6cca3d164018b1150916f8","lessThan":"21b11e8581285c6f10ef43d05df349d445f24273","status":"affected","versionType":"git"},{"version":"c6994e6f067cf0fc4c6cca3d164018b1150916f8","lessThan":"0d41772d98dcaf6c17e875b7d0ea0154ae1191ee","status":"affected","versionType":"git"},{"version":"c6994e6f067cf0fc4c6cca3d164018b1150916f8","lessThan":"c6da4fed7537aec19880c24f6c3a95065adb1406","status":"affected","versionType":"git"},{"version":"c6994e6f067cf0fc4c6cca3d164018b1150916f8","lessThan":"be2d32f0c3fe333d14c0a9ca90328dacbc3e06b8","status":"affected","versionType":"git"},{"version":"c6994e6f067cf0fc4c6cca3d164018b1150916f8","lessThan":"8e5eb1d6e6a3d7bbea9c92132d0cda5793176426","status":"affected","versionType":"git"},{"version":"c6994e6f067cf0fc4c6cca3d164018b1150916f8","lessThan":"26304d124e7f0383f8fe1168b5801a0ac7e16b1c","status":"affected","versionType":"git"},{"version":"c6994e6f067cf0fc4c6cca3d164018b1150916f8","lessThan":"6e0e34d85cd46ceb37d16054e97a373a32770f6c","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/usb/gadget/function/f_uac1_legacy.c"],"versions":[{"version":"2.6.31","status":"affected"},{"version":"0","lessThan":"2.6.31","status":"unaffected","versionType":"semver"},{"version":"5.10.253","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.203","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.168","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.134","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.81","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.22","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.12","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"5.10.253"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"5.15.203"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.1.168"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.6.134"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.12.81"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.18.22"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.19.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"7.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/557d1d4e862eccd0b74cc377b66de3e1e8d49605"},{"url":"https://git.kernel.org/stable/c/21b11e8581285c6f10ef43d05df349d445f24273"},{"url":"https://git.kernel.org/stable/c/0d41772d98dcaf6c17e875b7d0ea0154ae1191ee"},{"url":"https://git.kernel.org/stable/c/c6da4fed7537aec19880c24f6c3a95065adb1406"},{"url":"https://git.kernel.org/stable/c/be2d32f0c3fe333d14c0a9ca90328dacbc3e06b8"},{"url":"https://git.kernel.org/stable/c/8e5eb1d6e6a3d7bbea9c92132d0cda5793176426"},{"url":"https://git.kernel.org/stable/c/26304d124e7f0383f8fe1168b5801a0ac7e16b1c"},{"url":"https://git.kernel.org/stable/c/6e0e34d85cd46ceb37d16054e97a373a32770f6c"}],"title":"usb: gadget: f_uac1_legacy: validate control request size","x_generator":{"engine":"bippy-1.2.0"}}}}