VYPR
High severity7.3NVD Advisory· Published Mar 4, 2026· Updated Apr 2, 2026

CVE-2026-23236

CVE-2026-23236

Description

In the Linux kernel, the following vulnerability has been resolved:

fbdev: smscufx: properly copy ioctl memory to kernelspace

The UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from userspace to kernelspace, and instead directly references the memory, which can cause problems if invalid data is passed from userspace. Fix this all up by correctly copying the memory before accessing it within the kernel.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Linux kernel's smscufx framebuffer driver improperly handles userspace memory in the UFX_IOCTL_IOCTL_REPORT_DAMAGE ioctl, leading to potential memory corruption.

Vulnerability

Overview

The Linux kernel's smscufx framebuffer driver contains a vulnerability in the UFX_IOCTL_REPORT_DAMAGE ioctl handler`. The ioctl does not properly copy data from userspace to kernelspace; instead, it directly references the user-supplied memory. This can lead to issues if invalid or malicious data is passed from userspace, potentially causing memory corruption or other undefined behavior [1].

Exploitation

An attacker with local access and the ability to invoke the UFX_IOCTL_REPORT_DAMAGE ioctl on a smscufx device can exploit this flaw. By crafting a malicious userspace buffer, the attacker can trigger the kernel to operate on untrusted data without proper validation or copying, which may lead to kernel memory corruption [2].

Impact

Successful exploitation could allow an attacker to corrupt kernel memory, potentially leading to a denial of service (system crash) or, in more severe cases, privilege escalation. The vulnerability is rated High with a CVSS v3 score of 7.3, reflecting the potential for significant impact on system integrity and availability [3].

Mitigation

The fix involves correctly copying the userspace memory to kernelspace before accessing it, ensuring that the kernel operates on a validated copy. The patch has been applied to the Linux kernel stable tree and is available in commits such as 6167af934f95 and 1c008ad0f0d1 [4]. Users are advised to update their kernels to include this patched version.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernel2 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=3.2,<5.10.251
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.