drm/ioc32: stop speculation on the drm_compat_ioctl path
Summary
| CVE | CVE-2026-31781 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-01 15:16:41 UTC |
| Updated | 2026-05-11 20:51:42 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: drm/ioc32: stop speculation on the drm_compat_ioctl path The drm compat ioctl path takes a user controlled pointer, and then dereferences it into a table of function pointers, the signature method of spectre problems. Fix this up by calling array_index_nospec() on the index to the function pointer list. |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS: 0.000240000 probability, percentile 0.068060000 (date 2026-05-05)
Problem Types: NVD-CWE-noinfo
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 505b5240329b922f21f91d5b5d1e535c805eca6d 46a60ee8956ef1975f00455f614761c7ecedc09d git | Not specified |
| CNA | Linux | Linux | affected 505b5240329b922f21f91d5b5d1e535c805eca6d 5bb398991f378ef74d90b14a6ea8b61ff96cc03a git | Not specified |
| CNA | Linux | Linux | affected 505b5240329b922f21f91d5b5d1e535c805eca6d d59c5d8539662d95887b4564f3f72ad38076a2d5 git | Not specified |
| CNA | Linux | Linux | affected 505b5240329b922f21f91d5b5d1e535c805eca6d 489f2ef2b908898d01df697dc4fe1476674be640 git | Not specified |
| CNA | Linux | Linux | affected 505b5240329b922f21f91d5b5d1e535c805eca6d 4a41c2b18fc05d30b718d2602cac339eae710b34 git | Not specified |
| CNA | Linux | Linux | affected 505b5240329b922f21f91d5b5d1e535c805eca6d f0e441be08a2eab10b2d06fccfa267ee599dd6b3 git | Not specified |
| CNA | Linux | Linux | affected 505b5240329b922f21f91d5b5d1e535c805eca6d 27ef84bba9b9d7b03418c60fbc6069ea0e87b13c git | Not specified |
| CNA | Linux | Linux | affected 505b5240329b922f21f91d5b5d1e535c805eca6d f8995c2df519f382525ca4bc90553ad2ec611067 git | Not specified |
| CNA | Linux | Linux | affected abc60edcfc87771ff244763d4d19c67766f5dd0f git | Not specified |
| CNA | Linux | Linux | affected a2a840d6dcae960c2dfdf3fcb1b759e1b7d90663 git | Not specified |
| CNA | Linux | Linux | affected 00279b505289f7529d9be2e78915d0483ffbd314 git | Not specified |
| CNA | Linux | Linux | affected d04e6ea0cec9e7d6cba806508f657d2d0dc6cacf git | Not specified |
| CNA | Linux | Linux | affected 7f3ebea19795eb38438cd3709fabf2afd53cf447 git | Not specified |
| CNA | Linux | Linux | affected 4.20 | Not specified |
| CNA | Linux | Linux | unaffected 4.20 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.168 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.134 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.81 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.22 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.12 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/5bb398991f378ef74d90b14a6ea8b61ff96cc03a | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/489f2ef2b908898d01df697dc4fe1476674be640 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/46a60ee8956ef1975f00455f614761c7ecedc09d | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/f8995c2df519f382525ca4bc90553ad2ec611067 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/f0e441be08a2eab10b2d06fccfa267ee599dd6b3 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/27ef84bba9b9d7b03418c60fbc6069ea0e87b13c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/4a41c2b18fc05d30b718d2602cac339eae710b34 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/d59c5d8539662d95887b4564f3f72ad38076a2d5 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.