In the Linux kernel, the following vulnerability has been resolved:
fbdev: smscufx: properly copy ioctl memory to kernelspace
The UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from
userspace to kernelspace, and instead directly references the memory,
which can cause problems if invalid data is passed from userspace. Fix
this all up by correctly copying the memory before accessing it within
the kernel.
References
Configurations
Configuration 1 (hide)
|
History
17 Mar 2026, 21:20
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/061cfeb560aa3ddc174153dbe5be9d0b55eb7248 - Patch | |
| References | () https://git.kernel.org/stable/c/0634e8d650993602fc5b389ff7ac525f6542e141 - Patch | |
| References | () https://git.kernel.org/stable/c/120adae7b42faa641179270c067864544a50ab69 - Patch | |
| References | () https://git.kernel.org/stable/c/1c008ad0f0d1c1523902b9cdb08e404129677bfc - Patch | |
| References | () https://git.kernel.org/stable/c/52917e265aa5f848212f60fc50fc504d8ef12866 - Patch | |
| References | () https://git.kernel.org/stable/c/6167af934f956d3ae1e06d61f45cd0d1004bbe1a - Patch | |
| References | () https://git.kernel.org/stable/c/a0321e6e58facb39fe191caa0e52ed9aab6a48fe - Patch | |
| References | () https://git.kernel.org/stable/c/f1e91bd4efeae48b0f42caed7e8ce2e3a0d05b02 - Patch |
04 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-04 15:16
Updated : 2026-03-17 21:20
NVD link : CVE-2026-23236
Mitre link : CVE-2026-23236
CVE.ORG link : CVE-2026-23236
JSON object : View
Products Affected
linux
- linux_kernel
CWE
