SB20260325176 - Integer overflow in Linux kernel accel amdxdna driver



SB20260325176 - Integer overflow in Linux kernel accel amdxdna driver

Published: March 25, 2026

Security Bulletin ID SB20260325176
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Integer overflow (CVE-ID: CVE-2026-23280)

The vulnerability allows a local user to cause memory corruption and potentially execute arbitrary code.

The vulnerability exists due to improper input validation in the AMDXDNA driver's ubuf size calculation when handling memory allocation requests. A local user can provide specially crafted input to trigger an integer overflow, resulting in an undersized allocation and subsequent memory corruption.

The attacker must have the ability to load or interact with the AMDXDNA driver, which typically requires user privileges on the system.


Remediation

Install update from vendor's website.