Home

Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Limit PTP to a single page Commit 391e69143d0a increased CT_PTP_NUM from 1 to 4 to support 256 playback streams, but the additional pages are not used by the card correctly. The CT20K2 hardware already has multiple VMEM_PTPAL registers, but using them separately would require refactoring the entire virtual memory allocation logic. ct_vm_map() always uses PTEs in vm->ptp[0].area regardless of CT_PTP_NUM. On AMD64 systems, a single PTP covers 512 PTEs (2M). When aggregate memory allocations exceed this limit, ct_vm_map() tries to access beyond the allocated space and causes a page fault: BUG: unable to handle page fault for address: ffffd4ae8a10a000 Oops: Oops: 0002 [#1] SMP PTI RIP: 0010:ct_vm_map+0x17c/0x280 [snd_ctxfi] Call Trace: atc_pcm_playback_prepare+0x225/0x3b0 ct_pcm_playback_prepare+0x38/0x60 snd_pcm_do_prepare+0x2f/0x50 snd_pcm_action_single+0x36/0x90 snd_pcm_action_nonatomic+0xbf/0xd0 snd_pcm_ioctl+0x28/0x40 __x64_sys_ioctl+0x97/0xe0 do_syscall_64+0x81/0x610 entry_SYSCALL_64_after_hwframe+0x76/0x7e Revert CT_PTP_NUM to 1. The 256 SRC_RESOURCE_NUM and playback_count remain unchanged.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-27 | Assigner Linux




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

391e69143d0a05f960e3ab39a8c26b7b230bb8a9 (git) before 452894005b4abe141b11fe01e7bfe152e6d3860f
affected

391e69143d0a05f960e3ab39a8c26b7b230bb8a9 (git) before 365c36e1a126c6aa1aecedd3a351bcabc66f0c29
affected

391e69143d0a05f960e3ab39a8c26b7b230bb8a9 (git) before 3fd0685d7fef68c2d8a04876bcf9eaa0724ad6a5
affected

391e69143d0a05f960e3ab39a8c26b7b230bb8a9 (git) before b7f5ecd13cce8c2f8fa5a84c9aab65997142577e
affected

391e69143d0a05f960e3ab39a8c26b7b230bb8a9 (git) before ad9011a795407093dcf507f6e5da1828987b4b47
affected

391e69143d0a05f960e3ab39a8c26b7b230bb8a9 (git) before e9418da50d9e5c496c22fe392e4ad74c038a94eb
affected

Default status
affected

3.2
affected

Any version before 3.2
unaffected

6.6.136 (semver)
unaffected

6.12.83 (semver)
unaffected

6.18.24 (semver)
unaffected

6.19.14 (semver)
unaffected

7.0.1 (semver)
unaffected

7.1-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/452894005b4abe141b11fe01e7bfe152e6d3860f

git.kernel.org/...c/365c36e1a126c6aa1aecedd3a351bcabc66f0c29

git.kernel.org/...c/3fd0685d7fef68c2d8a04876bcf9eaa0724ad6a5

git.kernel.org/...c/b7f5ecd13cce8c2f8fa5a84c9aab65997142577e

git.kernel.org/...c/ad9011a795407093dcf507f6e5da1828987b4b47

git.kernel.org/...c/e9418da50d9e5c496c22fe392e4ad74c038a94eb

cve.org (CVE-2026-31602)

nvd.nist.gov (CVE-2026-31602)

Download JSON