CVE-2026-31411 — Untrusted Pointer Dereference in Linux
Severity
7.0HIGH
No vectorEPSS
0.0%
top 90.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 8
Latest updateApr 13
Description
In the Linux kernel, the following vulnerability has been resolved:
net: atm: fix crash due to unvalidated vcc pointer in sigd_send()
Reproducer available at [1].
The ATM send path (sendmsg -> vcc_sendmsg -> sigd_send) reads the vcc
pointer from msg->vcc and uses it directly without any validation. This
pointer comes from userspace via sendmsg() and can be arbitrarily forged:
int fd = socket(AF_ATMSVC, SOCK_DGRAM, 0);
ioctl(fd, ATMSIGD_CTRL); // become ATM signaling daemon
struct msghdr msg …
Affected Packages3 packages
▶CVEListV5linux/linux1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 — c96549d07dfdd51aadf0722cfb40711574424840+8
🔴Vulnerability Details
3VulDB▶
Linux Kernel up to 6.19.3 atm sigd_send null pointer dereference (Nessus ID 305621 / WID-SEC-2026-1037)↗2026-04-13
GHSA▶
GHSA-9q92-j4jr-j3jp: In the Linux kernel, the following vulnerability has been resolved:
net: atm: fix crash due to unvalidated vcc pointer in sigd_send()
Reproducer ava↗2026-04-08
OSV▶
CVE-2026-31411: In the Linux kernel, the following vulnerability has been resolved: net: atm: fix crash due to unvalidated vcc pointer in sigd_send() Reproducer avail↗2026-04-08
📋Vendor Advisories
2🕵️Threat Intelligence
1💬Community
1Bugzilla
▶