CVE-2026-23236
Received Received - Intake
Improper Memory Copy Vulnerability in Linux fbdev smscufx ioctl

Publication date: 2026-03-04

Last updated on: 2026-04-02

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: fbdev: smscufx: properly copy ioctl memory to kernelspace The UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from userspace to kernelspace, and instead directly references the memory, which can cause problems if invalid data is passed from userspace. Fix this all up by correctly copying the memory before accessing it within the kernel.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-04
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-03-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
linux linux_kernel From 5.16 (inc) to 6.1.164 (exc)
linux linux_kernel From 5.11 (inc) to 5.15.201 (exc)
linux linux_kernel From 6.2 (inc) to 6.6.127 (exc)
linux linux_kernel From 6.7 (inc) to 6.12.74 (exc)
linux linux_kernel From 6.13 (inc) to 6.18.13 (exc)
linux linux_kernel From 6.19 (inc) to 6.19.3 (exc)
linux linux_kernel From 3.2 (inc) to 5.10.251 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's fbdev smscufx driver, specifically in the handling of the UFX_IOCTL_REPORT_DAMAGE ioctl call.

The issue is that the ioctl does not properly copy data from userspace to kernelspace. Instead, it directly references the userspace memory.

This improper handling can cause problems if invalid or malicious data is passed from userspace, potentially leading to unexpected behavior or security issues.

The fix involved correctly copying the memory from userspace to kernelspace before accessing it within the kernel.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker to cause problems within the kernel by passing invalid data through the ioctl call.

Potential impacts include kernel instability, crashes, or other unexpected behavior due to improper memory handling.

Since the vulnerability involves direct referencing of userspace memory without proper copying, it might also be leveraged for privilege escalation or other security breaches depending on the context.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart