Description
In the Linux kernel, the following vulnerability has been resolved:

ALSA: ctxfi: Fix missing SPDIFI1 index handling

SPDIF1 DAIO type isn't properly handled in daio_device_index() for
hw20k2, and it returned -EINVAL, which ended up with the out-of-bounds
array access. Follow the hw20k1 pattern and return the proper index
for this type, too.
Published: 2026-05-01
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The ALSA ctxfi driver failed to handle the SPDIF1 DAIO type correctly, causing daio_device_index() to return an erroneous index for hw20k2. This caused an out‑of‑bounds array access, which can corrupt kernel memory. The corruption may lead to a system crash or provide a local attacker with the ability to execute code at elevated privileges, resulting in denial of service or privilege escalation.

Affected Systems

All Linux kernel builds that contain the ALSA ctxfi driver and have not been patched for this issue are affected. No specific kernel release numbers are listed in the available data.

Risk and Exploitability

The vulnerability does not have an associated CVSS score or EPSS information, and it is not listed in the CISA KEV catalog. As an out‑of‑bounds array access in kernel space, the exploit is likely to require local access and, in the worst case, could allow a local attacker to gain root privileges or cause a denial of service. The lack of public exploitation data suggests the risk is moderate, but the severity of potential memory corruption warrants prompt remediation.

Generated by OpenCVE AI on May 2, 2026 at 07:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to the latest release that contains the fix for SPDIFI1 index handling.
  • Reboot the system to load the patched kernel and ensure the ALSA ctxfi driver is fully updated.
  • If the patch cannot be applied immediately, disable SPDIF functionality or unload the ALSA ctxfi module to prevent the out‑of‑bounds access from occurring.

Generated by OpenCVE AI on May 2, 2026 at 07:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sat, 02 May 2026 07:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-129

Sat, 02 May 2026 07:30:00 +0000


Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Fix missing SPDIFI1 index handling SPDIF1 DAIO type isn't properly handled in daio_device_index() for hw20k2, and it returned -EINVAL, which ended up with the out-of-bounds array access. Follow the hw20k1 pattern and return the proper index for this type, too.
Title ALSA: ctxfi: Fix missing SPDIFI1 index handling
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-02T06:14:25.947Z

Reserved: 2026-03-09T15:48:24.140Z

Link: CVE-2026-31776

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:40.967

Modified: 2026-05-02T07:16:19.463

Link: CVE-2026-31776

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T07:30:36Z

Weaknesses