Description
In the Linux kernel, the following vulnerability has been resolved:

accel/amdxdna: Fix crash when destroying a suspended hardware context

If userspace issues an ioctl to destroy a hardware context that has
already been automatically suspended, the driver may crash because the
mailbox channel pointer is NULL for the suspended context.

Fix this by checking the mailbox channel pointer in aie2_destroy_context()
before accessing it.
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A null pointer dereference in the Linux kernel’s accel/amdxdna driver occurs when a userspace process issues an ioctl to destroy a hardware context that has already been automatically suspended. Deleting the context without checking the mailbox channel pointer causes the driver to crash, leading to a kernel panic and a complete loss of system availability.

Affected Systems

The flaw is present in any Linux kernel that includes the accel/amdxdna driver before the patch is applied. Since the CPE indicates the generic linux_kernel, all distributions using the stock Linux kernel or derivatives that have not incorporated the recent commit remain vulnerable until the driver is updated.

Risk and Exploitability

The EPSS score is reported as less than 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting that exploitation probability is low. Based on the description, it is inferred that an attacker would need to run code on the local machine with sufficient privileges to invoke the vulnerable ioctl, making the attack vector a local privileged user. Although the impact is a system crash, the low likelihood of public exploitation reinforces the importance of applying the fix promptly.

Generated by OpenCVE AI on March 26, 2026 at 03:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that includes the accel/amdxdna fix, ensuring the patched commit is present.
  • Reboot the system so the kernel and driver reload with the new code.
  • Verify the kernel version (e.g., uname -r) after the update to confirm that the patch has been applied.
  • If upgrading is not immediately possible, restrict access to the device file for accel/amdxdna by setting restrictive permissions or using SELinux/AppArmor rules, and consider applying a seccomp filter to block the ioctl that destroys contexts from untrusted processes.

Generated by OpenCVE AI on March 26, 2026 at 03:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Thu, 26 Mar 2026 00:15:00 +0000


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix crash when destroying a suspended hardware context If userspace issues an ioctl to destroy a hardware context that has already been automatically suspended, the driver may crash because the mailbox channel pointer is NULL for the suspended context. Fix this by checking the mailbox channel pointer in aie2_destroy_context() before accessing it.
Title accel/amdxdna: Fix crash when destroying a suspended hardware context
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:05:23.727Z

Reserved: 2026-01-13T15:37:45.998Z

Link: CVE-2026-23341

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T11:16:32.013

Modified: 2026-04-23T21:16:30.490

Link: CVE-2026-23341

cve-icon Redhat

Severity :

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23341 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:16:16Z

Weaknesses