CVE-2026-23288 (GCVE-0-2026-23288)

Vulnerability from cvelistv5 – Published: 2026-03-25 10:26 – Updated: 2026-04-13 06:03
VLAI?
Title
accel/amdxdna: Fix out-of-bounds memset in command slot handling
Summary
In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix out-of-bounds memset in command slot handling The remaining space in a command slot may be smaller than the size of the command header. Clearing the command header with memset() before verifying the available slot space can result in an out-of-bounds write and memory corruption. Fix this by moving the memset() call after the size validation.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 13ae1a6000f7d8b09478e3128e87d45e89c7282f , < cca770d710d5e03bc814af585cd6975eb6d74074 (git)
Affected: 3d32eb7a5ecff92d83a5fd34c45c171c17d3d5d0 , < 1110a949675ebd56b3f0286e664ea543f745801c (git)
Create a notification for this product.
    Linux Linux Affected: 6.19.4 , < 6.19.7 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/accel/amdxdna/aie2_message.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "cca770d710d5e03bc814af585cd6975eb6d74074",
              "status": "affected",
              "version": "13ae1a6000f7d8b09478e3128e87d45e89c7282f",
              "versionType": "git"
            },
            {
              "lessThan": "1110a949675ebd56b3f0286e664ea543f745801c",
              "status": "affected",
              "version": "3d32eb7a5ecff92d83a5fd34c45c171c17d3d5d0",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/accel/amdxdna/aie2_message.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "6.19.7",
              "status": "affected",
              "version": "6.19.4",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19.7",
                  "versionStartIncluding": "6.19.4",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/amdxdna: Fix out-of-bounds memset in command slot handling\n\nThe remaining space in a command slot may be smaller than the size of\nthe command header. Clearing the command header with memset() before\nverifying the available slot space can result in an out-of-bounds write\nand memory corruption.\n\nFix this by moving the memset() call after the size validation."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-13T06:03:41.191Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/cca770d710d5e03bc814af585cd6975eb6d74074"
        },
        {
          "url": "https://git.kernel.org/stable/c/1110a949675ebd56b3f0286e664ea543f745801c"
        }
      ],
      "title": "accel/amdxdna: Fix out-of-bounds memset in command slot handling",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-23288",
    "datePublished": "2026-03-25T10:26:47.458Z",
    "dateReserved": "2026-01-13T15:37:45.992Z",
    "dateUpdated": "2026-04-13T06:03:41.191Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2026-23288",
      "date": "2026-04-14",
      "epss": "0.00017",
      "percentile": "0.04064"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-23288\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-03-25T11:16:23.767\",\"lastModified\":\"2026-04-02T15:16:30.343\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\naccel/amdxdna: Fix out-of-bounds memset in command slot handling\\n\\nThe remaining space in a command slot may be smaller than the size of\\nthe command header. Clearing the command header with memset() before\\nverifying the available slot space can result in an out-of-bounds write\\nand memory corruption.\\n\\nFix this by moving the memset() call after the size validation.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad:\\n\\naccel/amdxdna: Correcci\u00f3n de memset fuera de l\u00edmites en el manejo de ranuras de comando\\n\\nEl espacio restante en una ranura de comando puede ser menor que el tama\u00f1o del encabezado de comando. Borrar el encabezado de comando con memset() antes de verificar el espacio de ranura disponible puede resultar en una escritura fuera de l\u00edmites y corrupci\u00f3n de memoria.\\n\\nEsto se corrige moviendo la llamada a memset() despu\u00e9s de la validaci\u00f3n del tama\u00f1o.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1110a949675ebd56b3f0286e664ea543f745801c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cca770d710d5e03bc814af585cd6975eb6d74074\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…