In the Linux kernel, the following vulnerability has been resolved:
ALSA: fireworks: bound device-supplied status before string array lookup
The status field in an EFW response is a 32-bit value supplied by the
firewire device. efr_status_names[] has 17 entries so a status value
outside that range goes off into the weeds when looking at the %s value.
Even worse, the status could return EFR_STATUS_INCOMPLETE which is
0x80000000, and is obviously not in that array of potential strings.
Fix this up by properly bounding the index against the array size and
printing "unknown" if it's not recognized.
References
Configurations
Configuration 1 (hide)
|
History
28 Apr 2026, 14:09
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/07704bbf36f57e4379e4cadf96410dab14621e3b - Patch | |
| References | () https://git.kernel.org/stable/c/67cfd14074cdafab5de3f7cfc0952c1a9b653e5d - Patch | |
| References | () https://git.kernel.org/stable/c/682d8accf0d83a871e8c327b95c81f53902c922b - Patch | |
| References | () https://git.kernel.org/stable/c/cc624b3d2be13297100539b64ad950695188e046 - Patch | |
| References | () https://git.kernel.org/stable/c/e103f98f6615ed2934e9cf340654f0cad9eb8a8a - Patch | |
| References | () https://git.kernel.org/stable/c/f856f4b6efd51be7950e4b84c06cd961961ca41c - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
27 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Apr 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
24 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-24 15:16
Updated : 2026-04-28 14:09
NVD link : CVE-2026-31619
Mitre link : CVE-2026-31619
CVE.ORG link : CVE-2026-31619
JSON object : View
Products Affected
linux
- linux_kernel
CWE
