Description
In the Linux kernel, the following vulnerability has been resolved:

accel/amdxdna: Prevent ubuf size overflow

The ubuf size calculation may overflow, resulting in an undersized
allocation and possible memory corruption.

Use check_add_overflow() helpers to validate the size calculation before
allocation.
Published: 2026-03-25
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Memory Corruption
Action: Patch
AI Analysis

Impact

The vulnerability exists in the Linux kernel component accel/amdxdna, where an integer overflow can occur during the calculation of the ubuf size. This overflow produces an undersized allocation and can lead to kernel memory corruption as described in the CVE. The weakness is identified as an integer over‑flow condition, CWE‑190.

Affected Systems

Affected is the Linux kernel, specifically the accel/amdxdna code path. Any kernel version released before the commit that introduces check_add_overflow is vulnerable. Users should verify that their kernel includes the patch or that the kernel version is newer than the fix commit.

Risk and Exploitability

The CVSS base score of 7.8 indicates high severity, while the EPSS score of less than 1 % suggests that exploitation is currently unlikely. The vulnerability is not present in the CISA KEV catalog. Based on the description, the likely required condition is local or privileged access to the AMD DNA accelerator driver or the ability to load code that interacts with the vulnerable memory calculation. A remote attacker would need an additional vector to gain kernel execution, so direct exploitation is not straightforward. The high score and memory corruption nature warrant timely remediation.

Generated by OpenCVE AI on April 2, 2026 at 17:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel release that contains the check_add_overflow patch
  • Verify that the kernel version is newer than the commit that added the fix
  • Reboot the system after updating the kernel to ensure the updated modules are used
  • Check system logs for any failures or corruption messages related to the accelerator driver

Generated by OpenCVE AI on April 2, 2026 at 17:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
CWE-680

Thu, 26 Mar 2026 00:15:00 +0000


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
CWE-680

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Prevent ubuf size overflow The ubuf size calculation may overflow, resulting in an undersized allocation and possible memory corruption. Use check_add_overflow() helpers to validate the size calculation before allocation.
Title accel/amdxdna: Prevent ubuf size overflow
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:03:31.645Z

Reserved: 2026-01-13T15:37:45.992Z

Link: CVE-2026-23280

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T11:16:22.523

Modified: 2026-04-02T15:16:30.177

Link: CVE-2026-23280

cve-icon Redhat

Severity :

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23280 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:23:11Z

Weaknesses