Linux Kernel TH1520 AON Firmware Buffer Overflow (CVE-2026-31690)
CVE-2026-31690 Published on April 27, 2026
firmware: thead: Fix buffer overflow and use standard endian macros
In the Linux kernel, the following vulnerability has been resolved:
firmware: thead: Fix buffer overflow and use standard endian macros
Addresses two issues in the TH1520 AON firmware protocol driver:
1. Fix a potential buffer overflow where the code used unsafe pointer
arithmetic to access the 'mode' field through the 'resource' pointer
with an offset. This was flagged by Smatch static checker as:
"buffer overflow 'data' 2 <= 3"
2. Replace custom RPC_SET_BE* and RPC_GET_BE* macros with standard
kernel endianness conversion macros (cpu_to_be16, etc.) for better
portability and maintainability.
The functionality was re-tested with the GPU power-up sequence,
confirming the GPU powers up correctly and the driver probes
successfully.
[ 12.702370] powervr ffef400000.gpu: [drm] loaded firmware
powervr/rogue_36.52.104.182_v1.fw
[ 12.711043] powervr ffef400000.gpu: [drm] FW version v1.0 (build
6645434 OS)
[ 12.719787] [drm] Initialized powervr 1.0.0 for ffef400000.gpu on
minor 0
Products Associated with CVE-2026-31690
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version e4b3cbd840e565484d0ad8d260d27c057466ed17 and below fbdb43f6bb2a15ed382d6eb0ef82c8b07b0d47bb is affected.
- Version e4b3cbd840e565484d0ad8d260d27c057466ed17 and below bd15a5deb5a7251dc1a0cf9186f0253f7eacdb97 is affected.
- Version e4b3cbd840e565484d0ad8d260d27c057466ed17 and below 88c4bd90725557796c15878b7cb70066e9e6b5ab is affected.
- Version 6.15 is affected.
- Before 6.15 is unaffected.
- Version 6.18.23, <= 6.18.* is unaffected.
- Version 6.19.13, <= 6.19.* is unaffected.
- Version 7.0, <= * is unaffected.