NULL pointer dereference in Linux kernel - CVE-2026-31510
Published: April 24, 2026
Vulnerability identifier: #VU127632
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-31510
CWE-ID: CWE-476
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to a null pointer dereference in l2cap_sock_ready_cb when handling L2CAP connection state changes. A local user can trigger the vulnerable code path to cause a denial of service.
The issue can lead to a kernel panic.
How to mitigate CVE-2026-31510
Install security update from vendor's repository.
Sources
- https://git.kernel.org/stable/c/03d4eafb0f3788239df63575951f6b4c97bbfda4
- https://git.kernel.org/stable/c/0780f9333852971ca77d110019e3a66ce5a7b100
- https://git.kernel.org/stable/c/1dc6db047919ecd59493cd51248b37381bbabcbb
- https://git.kernel.org/stable/c/3c821bc0fbeaa27910a20d0b43c6008d099792af
- https://git.kernel.org/stable/c/898b89c90ff9496e64b9331040778cc4e1b28c9d
- https://git.kernel.org/stable/c/a04a760c06bb591989db659439efdf106f0bae76
- https://git.kernel.org/stable/c/b6552e0503973daf6f23bd6ed9273ef131ee364f
- https://git.kernel.org/stable/c/d34776c7fa1f2c510f1cdd14823aba701babb4ad