Cyber Posture

CVE-2026-31607

Critical

Published: 24 April 2026

Published
24 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0007 21.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31607 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Linux Linux Kernel. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 21.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of untrusted network inputs like the RET_SUBMIT PDU's number_of_packets to prevent overwriting and subsequent heap out-of-bounds writes in urb->iso_frame_desc[].

prevent

Mandates identification, reporting, and correction of flaws like CVE-2026-31607 through kernel patches adding client-side validation in usbip_pack_ret_submit().

prevent

Provides memory protection mechanisms that mitigate exploitation of heap out-of-bounds writes triggered by invalid number_of_packets values.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Heap OOB write in USB/IP client kernel code enables remote exploitation of client for code execution (T1203) upon connecting to malicious server; kernel context directly yields privilege escalation (T1068) with RCE/DoS outcomes.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: usbip: validate number_of_packets in usbip_pack_ret_submit() When a USB/IP client receives a RET_SUBMIT response, usbip_pack_ret_submit() unconditionally overwrites urb->number_of_packets from the network PDU. This value is subsequently used as the loop bound…

more

in usbip_recv_iso() and usbip_pad_iso() to iterate over urb->iso_frame_desc[], a flexible array whose size was fixed at URB allocation time based on the *original* number_of_packets from the CMD_SUBMIT. A malicious USB/IP server can set number_of_packets in the response to a value larger than what was originally submitted, causing a heap out-of-bounds write when usbip_recv_iso() writes to urb->iso_frame_desc[i] beyond the allocated region. KASAN confirmed this with kernel 7.0.0-rc5: BUG: KASAN: slab-out-of-bounds in usbip_recv_iso+0x46a/0x640 Write of size 4 at addr ffff888106351d40 by task vhci_rx/69 The buggy address is located 0 bytes to the right of allocated 320-byte region [ffff888106351c00, ffff888106351d40) The server side (stub_rx.c) and gadget side (vudc_rx.c) already validate number_of_packets in the CMD_SUBMIT path since commits c6688ef9f297 ("usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input") and b78d830f0049 ("usbip: fix vudc_rx: harden CMD_SUBMIT path to handle malicious input"). The server side validates against USBIP_MAX_ISO_PACKETS because no URB exists yet at that point. On the client side we have the original URB, so we can use the tighter bound: the response must not exceed the original number_of_packets. This mirrors the existing validation of actual_length against transfer_buffer_length in usbip_recv_xbuff(), which checks the response value against the original allocation size. Kelvin Mbogo's series ("usb: usbip: fix integer overflow in usbip_recv_iso()", v2) hardens the receive-side functions themselves; this patch complements that work by catching the bad value at its source -- in usbip_pack_ret_submit() before the overwrite -- and using the tighter per-URB allocation bound rather than the global USBIP_MAX_ISO_PACKETS limit. Fix this by checking rpdu->number_of_packets against urb->number_of_packets in usbip_pack_ret_submit() before the overwrite. On violation, clamp to zero so that usbip_recv_iso() and usbip_pad_iso() safely return early.

Deeper analysisAI

CVE-2026-31607 is a heap out-of-bounds write vulnerability in the Linux kernel's USB/IP client implementation, specifically in the usbip_pack_ret_submit() function. When processing a RET_SUBMIT response from a USB/IP server, the function unconditionally overwrites the urb->number_of_packets field with a value from the network PDU. A malicious server can supply a larger value than the original number_of_packets set during URB allocation, leading to out-of-bounds writes in usbip_recv_iso() and usbip_pad_iso() when iterating over the flexible array urb->iso_frame_desc[]. This issue was confirmed via KASAN on kernel 7.0.0-rc5, affecting systems using USB/IP for remote USB device sharing over the network.

A remote attacker controlling or compromising a USB/IP server can exploit this vulnerability against any USB/IP client connected to it, requiring no privileges, user interaction, or special conditions (CVSS 9.8: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By crafting a RET_SUBMIT response with an inflated number_of_packets, the attacker triggers heap memory corruption beyond the allocated urb->iso_frame_desc[] region, potentially enabling arbitrary code execution, data tampering, or denial of service on the client system.

The vulnerability is addressed in Linux kernel stable releases via patches that add validation in usbip_pack_ret_submit() on the client side, comparing the response's rpdu->number_of_packets against the original urb->number_of_packets and clamping it to zero on violation to prevent the overwrite. This complements prior server-side (stub_rx.c) and gadget-side (vudc_rx.c) validations in CMD_SUBMIT paths and aligns with related hardening efforts like Kelvin Mbogo's series on receive-side integer overflow fixes. Patches are available at kernel.org stable commit hashes such as 2ab833a16a825373aad2ba7d54b572b277e95b71, 5e1c4ece08ccdc197177631f111845a2c68eede3, 885c8591784da6314f9aa82fa460ac69f9f79e5f, 8d155e2d1c4102f74f82a2bf9c016164bb0f7384, and 906f16a836de13fe61f49cdce2f66f2dbd14caf4 (CWE-787).

Details

CWE(s)

Affected Products

linux
linux kernel
2.6.39 — 6.6.136 · 6.7 — 6.12.83 · 6.13 — 6.18.24

CVEs Like This One

CVE-2026-31743Same product: Linux Linux Kernel
CVE-2025-21735Same product: Linux Linux Kernel
CVE-2025-71137Same product: Linux Linux Kernel
CVE-2026-23073Same product: Linux Linux Kernel
CVE-2025-21734Same product: Linux Linux Kernel
CVE-2025-21724Same product: Linux Linux Kernel
CVE-2025-71155Same product: Linux Linux Kernel
CVE-2024-54456Same product: Linux Linux Kernel
CVE-2026-23343Same product: Linux Linux Kernel
CVE-2023-52980Same product: Linux Linux Kernel

References