fbdev: smscufx: properly copy ioctl memory to kernelspace
Summary
| CVE | CVE-2026-23236 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-04 15:16:14 UTC |
| Updated | 2026-04-02 15:16:24 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: fbdev: smscufx: properly copy ioctl memory to kernelspace The UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from userspace to kernelspace, and instead directly references the memory, which can cause problems if invalid data is passed from userspace. Fix this all up by correctly copying the memory before accessing it within the kernel. |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Problem Types: NVD-CWE-noinfo
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| 3.1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Secondary | 7.3 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H |
| 3.1 | CNA | DECLARED | 7.3 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 3c8a63e22a0802fd56380f6ab305b419f18eb6f5 061cfeb560aa3ddc174153dbe5be9d0b55eb7248 git | Not specified |
| CNA | Linux | Linux | affected 3c8a63e22a0802fd56380f6ab305b419f18eb6f5 6167af934f956d3ae1e06d61f45cd0d1004bbe1a git | Not specified |
| CNA | Linux | Linux | affected 3c8a63e22a0802fd56380f6ab305b419f18eb6f5 a0321e6e58facb39fe191caa0e52ed9aab6a48fe git | Not specified |
| CNA | Linux | Linux | affected 3c8a63e22a0802fd56380f6ab305b419f18eb6f5 0634e8d650993602fc5b389ff7ac525f6542e141 git | Not specified |
| CNA | Linux | Linux | affected 3c8a63e22a0802fd56380f6ab305b419f18eb6f5 52917e265aa5f848212f60fc50fc504d8ef12866 git | Not specified |
| CNA | Linux | Linux | affected 3c8a63e22a0802fd56380f6ab305b419f18eb6f5 1c008ad0f0d1c1523902b9cdb08e404129677bfc git | Not specified |
| CNA | Linux | Linux | affected 3c8a63e22a0802fd56380f6ab305b419f18eb6f5 f1e91bd4efeae48b0f42caed7e8ce2e3a0d05b02 git | Not specified |
| CNA | Linux | Linux | affected 3c8a63e22a0802fd56380f6ab305b419f18eb6f5 120adae7b42faa641179270c067864544a50ab69 git | Not specified |
| CNA | Linux | Linux | affected 3.2 | Not specified |
| CNA | Linux | Linux | unaffected 3.2 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.251 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.201 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.164 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.127 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.74 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.13 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.3 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0-rc1 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/1c008ad0f0d1c1523902b9cdb08e404129677bfc | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/061cfeb560aa3ddc174153dbe5be9d0b55eb7248 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/6167af934f956d3ae1e06d61f45cd0d1004bbe1a | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/120adae7b42faa641179270c067864544a50ab69 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/a0321e6e58facb39fe191caa0e52ed9aab6a48fe | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/f1e91bd4efeae48b0f42caed7e8ce2e3a0d05b02 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/52917e265aa5f848212f60fc50fc504d8ef12866 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/0634e8d650993602fc5b389ff7ac525f6542e141 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.