Description
In the Linux kernel, the following vulnerability has been resolved:

accel/amdxdna: Validate command buffer payload count

The count field in the command header is used to determine the valid
payload size. Verify that the valid payload does not exceed the remaining
buffer space.
Published: 2026-04-03
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Memory Corruption via Unvalidated Command Buffer Count
Action: Apply Patch
AI Analysis

Impact

The kernel contains a flaw in the AMD XDNA acceleration layer where the command header field that counts payload items is not properly bounded against the size of the remaining buffer. This omission can lead to an out‑of‑bounds write that corrupts adjacent memory. An attacker who can supply malicious commands to the driver could therefore overwrite kernel data structures, potentially escalating privileges or causing system instability. This vulnerability directly manifests as a classic buffer overrun, classified as CWE‑787.

Affected Systems

All Linux kernel builds that compile the AMD XDNA acceleration module are affected. No specific kernel versions are enumerated in the advisory, so any kernel that includes the vulnerable code path prior to the fix remains at risk. The vulnerability applies to all processors that support the AMDXDNA interface as the driver is built into the generic Linux kernel.

Risk and Exploitability

The EPSS score is reported as below 1% and the issue has not been catalogued in CISA’s KEV list, indicating that widespread exploitation is currently unlikely. However, because the flaw allows unchecked memory writes, the potential impact is severe, encompassing arbitrary code execution in kernel mode. The attack vector is inferred to arise when an attacker can invoke commands through the AMDXDNA driver; local privilege escalation or remote exploitation would depend on how the driver is exposed in the target system. The lack of a publicly available exploit does not diminish the theoretical risk, but current data suggests low exploitation probability.

Generated by OpenCVE AI on April 7, 2026 at 09:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest stable kernel release or vendor patch that contains the fix for CVE-2026-23424
  • If an immediate kernel upgrade is not possible, disable AMD XDNA acceleration or remove the offending module from the system
  • Verify that the kernel is patched by checking module version or review the commit that introduced the change
  • Monitor kernel logs and system stability for signs of abnormal memory corruption if the vulnerability remains unpatched

Generated by OpenCVE AI on April 7, 2026 at 09:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Validate command buffer payload count The count field in the command header is used to determine the valid payload size. Verify that the valid payload does not exceed the remaining buffer space.
Title accel/amdxdna: Validate command buffer payload count
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T13:24:32.622Z

Reserved: 2026-01-13T15:37:46.015Z

Link: CVE-2026-23424

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T14:16:28.623

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-23424

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23424 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:54:13Z

Weaknesses