VYPR
High severity7.8NVD Advisory· Published Mar 25, 2026· Updated Apr 2, 2026

CVE-2026-23288

CVE-2026-23288

Description

In the Linux kernel, the following vulnerability has been resolved:

accel/amdxdna: Fix out-of-bounds memset in command slot handling

The remaining space in a command slot may be smaller than the size of the command header. Clearing the command header with memset() before verifying the available slot space can result in an out-of-bounds write and memory corruption.

Fix this by moving the memset() call after the size validation.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel AMD XDNA accelerator driver has an out-of-bounds write due to a memset before size validation in command slot handling, allowing memory corruption.

Vulnerability

CVE-2026-23288 is a vulnerability in the Linux kernel's accel/amdxdna driver. The root cause is an out-of-bounds write that occurs when handling command slots. Specifically, the driver uses memset() to clear a command header before verifying that the remaining space in the command slot is large enough to hold that header. If the available space is smaller than the header size, the memset() operation writes beyond the allocated buffer, leading to memory corruption [1][2].

Exploitation

An attacker with local access and sufficient privileges to interact with the accel/amdxdna driver could trigger this vulnerability. The issue is in the command submission path, which requires the ability to submit commands to the AMD XDNA accelerator. No network-based exploitation is described, and the prerequisite is local access to the kernel driver interface.

Impact

Successful exploitation can result in memory corruption, potentially leading to system instability, denial of service, or arbitrary code execution in the kernel context. The CVSS v3 score of 7.8 (High) reflects the potential for high impact on confidentiality, integrity, and availability, although it requires local access.

Mitigation

The fix was applied in the Linux kernel stable tree by moving the memset() call after the size validation. Users should update to a kernel version containing the commit that addresses CVE-2026-23288 [1][2]. No workarounds are documented, but limiting local access to the AMD XDNA driver may reduce the attack surface.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.