Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2914 articles · 109744 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-31411PATCHED
Linux · Linux

net: atm: fix crash due to unvalidated vcc pointer in sigd_send()

Description

In the Linux kernel, the following vulnerability has been resolved: net: atm: fix crash due to unvalidated vcc pointer in sigd_send() Reproducer available at [1]. The ATM send path (sendmsg -> vcc_sendmsg -> sigd_send) reads the vcc pointer from msg->vcc and uses it directly without any validation. This pointer comes from userspace via sendmsg() and can be arbitrarily forged: int fd = socket(AF_ATMSVC, SOCK_DGRAM, 0); ioctl(fd, ATMSIGD_CTRL); // become ATM signaling daemon struct msghdr msg = { .msg_iov = &iov, ... }; *(unsigned long *)(buf + 4) = 0xdeadbeef; // fake vcc pointer sendmsg(fd, &msg, 0); // kernel dereferences 0xdeadbeef In normal operation, the kernel sends the vcc pointer to the signaling daemon via sigd_enq() when processing operations like connect(), bind(), or listen(). The daemon is expected to return the same pointer when responding. However, a malicious daemon can send arbitrary pointer values. Fix this by introducing find_get_vcc() which validates the pointer by searching through vcc_hash (similar to how sigd_close() iterates over all VCCs), and acquires a reference via sock_hold() if found. Since struct atm_vcc embeds struct sock as its first member, they share the same lifetime. Therefore using sock_hold/sock_put is sufficient to keep the vcc alive while it is being used. Note that there may be a race with sigd_close() which could mark the vcc with various flags (e.g., ATM_VF_RELEASED) after find_get_vcc() returns. However, sock_hold() guarantees the memory remains valid, so this race only affects the logical state, not memory safety. [1]: https://gist.github.com/mrpre/1ba5949c45529c511152e2f4c755b0f3

Affected Products

VendorProductVersions
LinuxLinux1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 2.6.12, 6.19.3

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
linuxlinuxmitre_affected90%
open sourcelinux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/c96549d07dfdd51aadf0722cfb40711574424840
  • https://git.kernel.org/stable/c/1c8bda3df028d5e54134077dcd09f46ca8cfceb5
  • https://git.kernel.org/stable/c/3e1a8b00095246a9a2b46b57f6d471c6d3c00ed2
  • https://git.kernel.org/stable/c/e3f80666c2739296c3b69a127300455c43aa1067
  • https://git.kernel.org/stable/c/21c303fec138c002f90ed33bce60e807d53072bb
  • https://git.kernel.org/stable/c/69d3f9ee5489e6e8b66defcfa226e91d82393297
  • https://git.kernel.org/stable/c/440c9a5fc477a8ee259d8bf669531250b8398651
  • https://git.kernel.org/stable/c/ae88a5d2f29b69819dc7b04086734439d074a643

Related News (3 articles)

Tier B
BSI Advisories1d ago
[NEU] [niedrig] Linux Kernel: Schwachstelle ermöglicht Denial of Service
→ No new info (linked only)
Tier C
VulDB1d ago
CVE-2026-31411 | Linux Kernel up to 6.19.3 atm sigd_send null pointer dereference
→ No new info (linked only)
Tier C
Linux Kernel CVEs2d ago
CVE-2026-31411: net: atm: fix crash due to unvalidated vcc pointer in sigd_send()
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
Patch available
c96549d07dfdd51aadf0722cfb407115744248401c8bda3df028d5e54134077dcd09f46ca8cfceb53e1a8b00095246a9a2b46b57f6d471c6d3c00ed2e3f80666c2739296c3b69a127300455c43aa106721c303fec138c002f90ed33bce60e807d53072bb69d3f9ee5489e6e8b66defcfa226e91d82393297440c9a5fc477a8ee259d8bf669531250b8398651ae88a5d2f29b69819dc7b04086734439d074a64305.10.2525.15.2026.1.1656.6.1286.12.756.18.146.19.47.0-rc1
CWECWE-476
PublishedApr 8, 2026
Last enriched1d agov2
Tags
CVE-2026-31411
Trending Score32
Source articles3
Independent3
Info Completeness8/14
Missing: cvss, epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-23400EXP
In the Linux kernel, the following vulnerability has been resolved: rust_binder: call set_notification_done() without proc lock Consider the following sequence of events on a death listener: 1. The
Trending: 63
HIGHCVE-2026-23406EXP
apparmor: fix side-effect bug in match_char() macro usage
Trending: 62
HIGHCVE-2026-23398EXP
In the Linux kernel, the following vulnerability has been resolved: icmp: fix NULL pointer dereference in icmp_tag_validation() icmp_tag_validation() unconditionally dereferences the result of rcu_d
Trending: 60
HIGHCVE-2026-31412EXP
usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks()
Trending: 58
HIGHCVE-2025-71086
In the Linux kernel, the following vulnerability has been resolved: net: rose: fix invalid array index in rose_kill_by_device() rose_kill_by_device() collects sockets into a local array[] and then i
Trending: 39

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 8, 2026
Discovered by ZDM
Apr 8, 2026
Patch Available
Apr 8, 2026
Updated: affectedVersions, cweIds, tags
Apr 8, 2026

Version History

v2
Last enriched 1d ago
v2Tier C1d ago

Updated severity to CRITICAL, added affected version 6.19.3, and included CWE-476.

affectedVersionscweIdstags
via VulDB
v11d ago

Initial creation