Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1693 articles · 103854 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23424PATCHED
linux · linux kernel

accel/amdxdna: Validate command buffer payload count

Description

A vulnerability classified as critical was found in Linux Kernel up to 6.18.16/6.19.6/7.0-rc1. Impacted is an unknown function of the component amdxdna. Executing a manipulation of the argument Count can lead to buffer overflow. This vulnerability is handled as CVE-2026-23424. The attack can only be done within the local network.

Affected Products

VendorProductVersions
linuxlinux kernelaac243092b707bb3018e951d470cc1a9bcbaba6c, aac243092b707bb3018e951d470cc1a9bcbaba6c, aac243092b707bb3018e951d470cc1a9bcbaba6c, 6.14, 6.18.16, 6.19.6, 7.0-rc1

References

  • https://git.kernel.org/stable/c/3464e751755172ddbb849c1bd92f5f59e95c59a1
  • https://git.kernel.org/stable/c/3ed2ae6b3fe869f99b75afd02045ba5c0c0773e2
  • https://git.kernel.org/stable/c/901ec3470994006bc8dd02399e16b675566c3416

Related News (2 articles)

Tier C
VulDB2h ago
CVE-2026-23424 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc1 amdxdna Count buffer overflow
→ No new info (linked only)
Tier C
Linux Kernel CVEs4h ago
CVE-2026-23424: accel/amdxdna: Validate command buffer payload count
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
Patch available
3464e751755172ddbb849c1bd92f5f59e95c59a13ed2ae6b3fe869f99b75afd02045ba5c0c0773e2901ec3470994006bc8dd02399e16b675566c341606.18.176.19.77.0-rc2
PublishedApr 3, 2026
Last enriched2h agov2
Trending Score41
Source articles2
Independent2
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23444EXP
wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure
Trending: 61
CRITICALCVE-2026-23421EXP
drm/xe/configfs: Free ctx_restore_mid_bb in release
Trending: 61
CRITICALCVE-2026-23461EXP
Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user
Trending: 61
CRITICALCVE-2026-23443EXP
ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
Trending: 61
CRITICALCVE-2026-23475EXP
spi: fix statistics allocation
Trending: 61

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Patch Available
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Updated: description, severity, affectedVersions
Apr 3, 2026

Version History

v2
Last enriched 2h ago
v2Tier C2h ago

Updated severity to CRITICAL, added affected versions 6.18.16, 6.19.6, and 7.0-rc1, and corrected exploit availability status.

descriptionseverityaffectedVersions
via VulDB
v13h ago

Initial creation