Impact
The kernel contains a flaw in the AMD XDNA acceleration layer where the command header field that counts payload items is not properly bounded against the size of the remaining buffer. This omission can lead to an out‑of‑bounds write that corrupts adjacent memory. An attacker who can supply malicious commands to the driver could therefore overwrite kernel data structures, potentially escalating privileges or causing system instability. This vulnerability directly manifests as a classic buffer overrun, classified as CWE‑787.
Affected Systems
All Linux kernel builds that compile the AMD XDNA acceleration module are affected. No specific kernel versions are enumerated in the advisory, so any kernel that includes the vulnerable code path prior to the fix remains at risk. The vulnerability applies to all processors that support the AMDXDNA interface as the driver is built into the generic Linux kernel.
Risk and Exploitability
The EPSS score is reported as below 1% and the issue has not been catalogued in CISA’s KEV list, indicating that widespread exploitation is currently unlikely. However, because the flaw allows unchecked memory writes, the potential impact is severe, encompassing arbitrary code execution in kernel mode. The attack vector is inferred to arise when an attacker can invoke commands through the AMDXDNA driver; local privilege escalation or remote exploitation would depend on how the driver is exposed in the target system. The lack of a publicly available exploit does not diminish the theoretical risk, but current data suggests low exploitation probability.
OpenCVE Enrichment