#VU125838 Improper input validation in Linux kernel - CVE-2026-31411
Published: April 13, 2026
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper input validation in sigd_send() when handling sendmsg() input containing a forged vcc pointer. A local user can send a specially crafted message to cause a denial of service.
Exploitation requires control of the ATM signaling daemon role via the ATMSIGD_CTRL ioctl.
Remediation
External links
- https://git.kernel.org/stable/c/1c8bda3df028d5e54134077dcd09f46ca8cfceb5
- https://git.kernel.org/stable/c/21c303fec138c002f90ed33bce60e807d53072bb
- https://git.kernel.org/stable/c/3e1a8b00095246a9a2b46b57f6d471c6d3c00ed2
- https://git.kernel.org/stable/c/440c9a5fc477a8ee259d8bf669531250b8398651
- https://git.kernel.org/stable/c/69d3f9ee5489e6e8b66defcfa226e91d82393297
- https://git.kernel.org/stable/c/ae88a5d2f29b69819dc7b04086734439d074a643
- https://git.kernel.org/stable/c/c96549d07dfdd51aadf0722cfb40711574424840
- https://git.kernel.org/stable/c/e3f80666c2739296c3b69a127300455c43aa1067