CVE-2026-31776
Description
In the Linux kernel, the following vulnerability has been resolved:
ALSA: ctxfi: Fix missing SPDIFI1 index handling
SPDIF1 DAIO type isn't properly handled in daio_device_index() for hw20k2, and it returned -EINVAL, which ended up with the out-of-bounds array access. Follow the hw20k1 pattern and return the proper index for this type, too.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing SPDIF1 index handling in Linux kernel's ALSA ctxfi driver leads to out-of-bounds array access, potentially exploitable for privilege escalation.
Vulnerability
Description
In the Linux kernel, the ALSA ctxfi sound driver for Creative Sound Blaster X-Fi devices fails to properly handle the SPDIF1 DAIO type in the daio_device_index() function for the hw20k2 chip variant. Instead of returning the correct index, it returns -EINVAL, which causes the caller to access an array out of bounds. This bug was introduced when the function was implemented for hw20k1 but not for hw20k2.
Exploitation
The vulnerability can be triggered by any local user who can interact with the sound subsystem, such as through the ALSA API. No special privileges are required beyond the ability to open and manipulate sound devices. An attacker could craft a sequence of ioctl calls that result in an out-of-bounds read or write past the allocated dao array. The exact attack vector depends on the driver's usage of the returned index, but the out-of-bounds access can potentially overwrite kernel memory.
Impact
Successful exploitation could lead to arbitrary code execution in the kernel context, privilege escalation, or system crash (denial of service). Given the high CVSS v3 score of 7.8, the vulnerability is considered serious, especially on systems with affected Sound Blaster hardware and the ctxfi driver loaded.
Mitigation
The fix is included in the Linux kernel stable updates. Users should apply the latest updates from their distribution. The commits [1] and [2] address the issue by adding the missing SPDIF1 index handling, following the same pattern as hw20k1. No workarounds are known, but unloading the ctxfi module (modprobe -r ctxfi) may mitigate the risk if the device is not needed.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
9(expand)+ 7 more
- (no CPE)
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.19,<6.19.12
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
News mentions
0No linked articles in our index yet.