CVE-2026-23288Incorrect Calculation of Buffer Size in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 95.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix out-of-bounds memset in command slot handling The remaining space in a command slot may be smaller than the size of the command header. Clearing the command header with memset() before verifying the available slot space can result in an out-of-bounds write and memory corruption. Fix this by moving the memset() call after the size validation.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

Linuxlinux/linux_kernel< 6.19.7
Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linux13ae1a6000f7d8b09478e3128e87d45e89c7282fcca770d710d5e03bc814af585cd6975eb6d74074+2
debiandebian/linux< linux 6.19.8-1 (forky)

🔴Vulnerability Details

3
GHSA
GHSA-2x42-x3cv-9629: In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix out-of-bounds memset in command slot handling The remaining s2026-03-25
OSV
CVE-2026-23288: In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix out-of-bounds memset in command slot handling The remaining spa2026-03-25
OSV
accel/amdxdna: Fix out-of-bounds memset in command slot handling2026-03-25

📋Vendor Advisories

2
Red Hat
kernel: accel/amdxdna: Fix out-of-bounds memset in command slot handling2026-03-25
Debian
CVE-2026-23288: linux - In the Linux kernel, the following vulnerability has been resolved: accel/amdxd...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23288 Impact, Exploitability, and Mitigation Steps | Wiz