CVE-2026-31781
Description
AI Translation Available
In the Linux kernel, the following vulnerability has been resolved:
drm/ioc32: stop speculation on the drm_compat_ioctl path
The drm compat ioctl path takes a user controlled pointer, and then
dereferences it into a table of function pointers, the signature method
of spectre problems. Fix this up by calling array_index_nospec() on the
index to the function pointer list.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0002
Percentile
0,1th
Updated
Single Data Point
Only one EPSS measurement is available for this CVE. Trend analysis requires multiple data points over time.
https://git.kernel.org/stable/c/27ef84bba9b9d7b03418c60fbc6069ea0e87b13c
https://git.kernel.org/stable/c/46a60ee8956ef1975f00455f614761c7ecedc09d
https://git.kernel.org/stable/c/489f2ef2b908898d01df697dc4fe1476674be640
https://git.kernel.org/stable/c/4a41c2b18fc05d30b718d2602cac339eae710b34
https://git.kernel.org/stable/c/5bb398991f378ef74d90b14a6ea8b61ff96cc03a
https://git.kernel.org/stable/c/d59c5d8539662d95887b4564f3f72ad38076a2d5
https://git.kernel.org/stable/c/f0e441be08a2eab10b2d06fccfa267ee599dd6b3
https://git.kernel.org/stable/c/f8995c2df519f382525ca4bc90553ad2ec611067