CVE-2026-31777
ALSA: ctxfi Driver Index Mapping Error Handling Fix
Publication date: 2026-05-01
Last updated on: 2026-05-07
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 2.6.31 (inc) to 6.19.12 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's ALSA ctxfi driver. The driver assumed that the function daio_device_index() would always return a valid value, but this assumption was incorrect. The vulnerability arises because the driver did not properly check for errors returned by daio_device_index(), potentially leading to improper behavior.
How can this vulnerability impact me? :
Because the ctxfi driver did not check for errors from daio_device_index(), it could lead to unexpected or incorrect behavior in the ALSA sound subsystem. This might cause system instability or malfunction related to audio device handling.