Impact
An out-of-bounds write occurs while clearing a command header in the Linux kernel's AMD XDNA acceleration driver. The memset call is performed before the code verifies that the command slot has sufficient space, allowing the buffer to be overwritten beyond its end. This memory corruption could enable an attacker to alter kernel memory or execute arbitrary code, compromising system integrity.
Affected Systems
The vulnerability is present in the Linux kernel inside the accel/amdxdna module. All kernel versions that include the uncov unpatched copy of this driver are affected. The specific versions impacted are not listed in the advisory, but the patch commit 1110a949 has been merged into the mainline kernel, so any system running a kernel older than the commit line is at risk.
Risk and Exploitability
The CVSS score of 7.8 classifies it as a high severity issue. EPSS indicates a very low likelihood of exploitation (<1%), and it is not listed in the CISA KEV catalog. The flaw is local to systems that load the AMD XDNA driver; an attacker would need local or privileged access to exploit it. Nonetheless, due to the potential for kernel compromise, the risk justifies prompt correction.
OpenCVE Enrichment