PT-2026-31306 · Linux · Linux Kernel

Published

2026-04-08

·

Updated

2026-04-12

·

CVE-2026-31411

CVSS v2.0

4.6

Medium

AV:L/AC:L/Au:S/C:N/I:N/A:C
Name of the Vulnerable Software and Affected Versions Linux kernel (affected versions not specified)
Description The Linux kernel contains a flaw in the ATM send path (sendmsg -> vcc sendmsg -> sigd send). The system reads the vcc pointer from msg->vcc without validation, and this pointer originates from user space via sendmsg(), making it susceptible to forgery. A malicious daemon can send arbitrary pointer values. This can lead to a crash due to the kernel dereferencing an invalid pointer. The issue is addressed by introducing find get vcc(), which validates the pointer by searching vcc hash and acquiring a reference using sock hold() if found.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Untrusted Pointer Dereference

Weakness Enumeration

Related Identifiers

BDU:2026-05019
CVE-2026-31411

Affected Products

Linux Kernel