SB2026041325 - Improper input validation in Linux kernel atm
Published: April 13, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper input validation (CVE-ID: CVE-2026-31411)
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper input validation in sigd_send() when handling sendmsg() input containing a forged vcc pointer. A local user can send a specially crafted message to cause a denial of service.
Exploitation requires control of the ATM signaling daemon role via the ATMSIGD_CTRL ioctl.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/1c8bda3df028d5e54134077dcd09f46ca8cfceb5
- https://git.kernel.org/stable/c/21c303fec138c002f90ed33bce60e807d53072bb
- https://git.kernel.org/stable/c/3e1a8b00095246a9a2b46b57f6d471c6d3c00ed2
- https://git.kernel.org/stable/c/440c9a5fc477a8ee259d8bf669531250b8398651
- https://git.kernel.org/stable/c/69d3f9ee5489e6e8b66defcfa226e91d82393297
- https://git.kernel.org/stable/c/ae88a5d2f29b69819dc7b04086734439d074a643
- https://git.kernel.org/stable/c/c96549d07dfdd51aadf0722cfb40711574424840
- https://git.kernel.org/stable/c/e3f80666c2739296c3b69a127300455c43aa1067