Impact
The vulnerability exists in the Linux kernel component accel/amdxdna, where an integer overflow can occur during the calculation of the ubuf size. This overflow produces an undersized allocation and can lead to kernel memory corruption as described in the CVE. The weakness is identified as an integer over‑flow condition, CWE‑190.
Affected Systems
Affected is the Linux kernel, specifically the accel/amdxdna code path. Any kernel version released before the commit that introduces check_add_overflow is vulnerable. Users should verify that their kernel includes the patch or that the kernel version is newer than the fix commit.
Risk and Exploitability
The CVSS base score of 7.8 indicates high severity, while the EPSS score of less than 1 % suggests that exploitation is currently unlikely. The vulnerability is not present in the CISA KEV catalog. Based on the description, the likely required condition is local or privileged access to the AMD DNA accelerator driver or the ability to load code that interacts with the vulnerable memory calculation. A remote attacker would need an additional vector to gain kernel execution, so direct exploitation is not straightforward. The high score and memory corruption nature warrant timely remediation.
OpenCVE Enrichment