CVE-2026-31619

In the Linux kernel, the following vulnerability has been resolved: ALSA: fireworks: bound device-supplied status before string array lookup The status field in an EFW response is a 32-bit value supplied by the firewire device. efr_status_names[] has 17 entries so a status value outside that range goes off into the weeds when looking at the %s value. Even worse, the status could return EFR_STATUS_INCOMPLETE which is 0x80000000, and is obviously not in that array of potential strings. Fix this up by properly bounding the index against the array size and printing "unknown" if it's not recognized.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

28 Apr 2026, 14:09

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/07704bbf36f57e4379e4cadf96410dab14621e3b - () https://git.kernel.org/stable/c/07704bbf36f57e4379e4cadf96410dab14621e3b - Patch
References () https://git.kernel.org/stable/c/67cfd14074cdafab5de3f7cfc0952c1a9b653e5d - () https://git.kernel.org/stable/c/67cfd14074cdafab5de3f7cfc0952c1a9b653e5d - Patch
References () https://git.kernel.org/stable/c/682d8accf0d83a871e8c327b95c81f53902c922b - () https://git.kernel.org/stable/c/682d8accf0d83a871e8c327b95c81f53902c922b - Patch
References () https://git.kernel.org/stable/c/cc624b3d2be13297100539b64ad950695188e046 - () https://git.kernel.org/stable/c/cc624b3d2be13297100539b64ad950695188e046 - Patch
References () https://git.kernel.org/stable/c/e103f98f6615ed2934e9cf340654f0cad9eb8a8a - () https://git.kernel.org/stable/c/e103f98f6615ed2934e9cf340654f0cad9eb8a8a - Patch
References () https://git.kernel.org/stable/c/f856f4b6efd51be7950e4b84c06cd961961ca41c - () https://git.kernel.org/stable/c/f856f4b6efd51be7950e4b84c06cd961961ca41c - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

27 Apr 2026, 14:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/f856f4b6efd51be7950e4b84c06cd961961ca41c -

27 Apr 2026, 12:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/07704bbf36f57e4379e4cadf96410dab14621e3b -

24 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 15:16

Updated : 2026-04-28 14:09


NVD link : CVE-2026-31619

Mitre link : CVE-2026-31619

CVE.ORG link : CVE-2026-31619


JSON object : View

Products Affected

linux

  • linux_kernel