Description
In the Linux kernel, the following vulnerability has been resolved:

fbdev: smscufx: properly copy ioctl memory to kernelspace

The UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from
userspace to kernelspace, and instead directly references the memory,
which can cause problems if invalid data is passed from userspace. Fix
this all up by correctly copying the memory before accessing it within
the kernel.
Published: 2026-03-04
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Kernel memory corruption with potential privilege escalation
Action: Patch
AI Analysis

Impact

The smscufx framebuffer driver includes an ioctl, UFX_IOCTL_REPORT_DAMAGE, that is intended to copy data from user space into kernel memory before use. Instead, the implementation references the user pointer directly. Therefore, if an attacker supplies crafted data, the kernel may perform invalid memory accesses, corrupting kernel memory. Such corruption could allow arbitrary code execution or privilege escalation from a local user.

Affected Systems

This issue affects the Linux kernel as a whole, specifically the smscufx framebuffer driver in the fbdev subsystem. All kernel releases lacking the commit that corrects the copy operation are potentially vulnerable, regardless of distribution or patch level.

Risk and Exploitability

The CVSS score of 7.3 classifies the vulnerability as high severity, while an EPSS score of <1% indicates a low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, suggesting no public exploitation has been reported. The attack vector is most likely local; an attacker with access to the /dev/smscufx device node can invoke the ioctl and supply malicious data, potentially leading to kernel memory corruption.

Generated by OpenCVE AI on April 15, 2026 at 17:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the kernel to a version that includes the smscufx ioctl copy fix (apply the relevant commit).
  • If an immediate kernel update is not possible, unload or disable the smscufx framebuffer driver to eliminate the vulnerable interface.
  • Restrict permissions on the smscufx device node so that only privileged users can invoke the ioctl, thereby reducing the attack surface.
  • Monitor kernel logs for anomalous access or crashes that may indicate exploitation attempts.

Generated by OpenCVE AI on April 15, 2026 at 17:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4498-1 linux security update
Debian DLA Debian DLA DLA-4499-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6163-1 linux security update
Debian DSA Debian DSA DSA-6162-1 linux security update
History

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H'}


Tue, 17 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Thu, 05 Mar 2026 00:15:00 +0000


Wed, 04 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: fbdev: smscufx: properly copy ioctl memory to kernelspace The UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from userspace to kernelspace, and instead directly references the memory, which can cause problems if invalid data is passed from userspace. Fix this all up by correctly copying the memory before accessing it within the kernel.
Title fbdev: smscufx: properly copy ioctl memory to kernelspace
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:02:53.775Z

Reserved: 2026-01-13T15:37:45.988Z

Link: CVE-2026-23236

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2026-03-04T15:16:14.173

Modified: 2026-04-02T15:16:24.923

Link: CVE-2026-23236

cve-icon Redhat

Severity :

Publid Date: 2026-03-04T00:00:00Z

Links: CVE-2026-23236 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:00:15Z

Weaknesses