Description
In the Linux kernel, the following vulnerability has been resolved:

accel/amdxdna: Validate command buffer payload count

The count field in the command header is used to determine the valid
payload size. Verify that the valid payload does not exceed the remaining
buffer space.
Published: 2026-04-03
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Memory Corruption via Out-of-Bounds Write
Action: Apply Patch
AI Analysis

Impact

The Linux kernel contains a flaw in the AMD XDNA acceleration module where the command header field that counts payload items is not bounded against the remaining buffer size. This omission can cause an out-of-bounds write that corrupts adjacent kernel memory. An attacker who can supply malicious commands to the driver could overwrite critical data structures, potentially leading to privilege escalation or system instability. The type of weakness is a classic buffer overflow (CWE-787). The likely attack vector is an attacker with the ability to send crafted commands to the AMD XDNA driver; this is inferred from the description of the vulnerable code path.

Affected Systems

All Linux kernel builds that compile the AMD XDNA acceleration module are affected. The CPE list indicates all Linux kernels, including kernel 6.14 and the 7.0 release candidates rc1 through rc7. Any kernel that contains the vulnerable code before the fix remains at risk.

Risk and Exploitability

The CVSS base score of 7.1 indicates high severity. The EPSS score is less than 1%, and the vulnerability is not listed in CISA’s KEV catalog, suggesting a low probability of large-scale exploitation. Nevertheless, because an attacker could write arbitrary kernel memory if they control command payloads, the potential impact is severe. The vulnerability can be leveraged for privilege escalation if an attacker can interact with the driver; no public exploit is available, but the risk remains theoretical.

Generated by OpenCVE AI on April 28, 2026 at 21:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel release or vendor patch that contains the fix for CVE-2026-23424
  • If an immediate kernel upgrade is not possible, disable AMD XDNA acceleration by unloading the module or otherwise restricting access to the device
  • Monitor kernel logs and system stability for signs of anomalous memory corruption or driver failures, and apply security updates as soon as they become available

Generated by OpenCVE AI on April 28, 2026 at 21:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}


Thu, 23 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:6.14:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Validate command buffer payload count The count field in the command header is used to determine the valid payload size. Verify that the valid payload does not exceed the remaining buffer space.
Title accel/amdxdna: Validate command buffer payload count
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-27T14:02:16.224Z

Reserved: 2026-01-13T15:37:46.015Z

Link: CVE-2026-23424

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2026-04-03T14:16:28.623

Modified: 2026-04-27T14:16:31.757

Link: CVE-2026-23424

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23424 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T22:00:14Z

Weaknesses