CVE-2026-23062

Source
https://cve.org/CVERecord?id=CVE-2026-23062
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23062.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23062
Downstream
Related
Published
2026-02-04T16:07:44.420Z
Modified
2026-03-24T08:59:22.202849Z
Summary
platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro
Details

In the Linux kernel, the following vulnerability has been resolved:

platform/x86: hp-bioscfg: Fix kernel panic in GETINSTANCEID macro

The GETINSTANCEID macro that caused a kernel panic when accessing sysfs attributes:

  1. Off-by-one error: The loop condition used '<=' instead of '<', causing access beyond array bounds. Since array indices are 0-based and go from 0 to instances_count-1, the loop should use '<'.

  2. Missing NULL check: The code dereferenced attrnamekobj->name without checking if attrnamekobj was NULL, causing a null pointer dereference in minlengthshow() and other attribute show functions.

The panic occurred when fwupd tried to read BIOS configuration attributes:

Oops: general protection fault [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] RIP: 0010:minlengthshow+0xcf/0x1d0 [hp_bioscfg]

Add a NULL check for attrnamekobj before dereferencing and corrects the loop boundary to match the pattern used elsewhere in the driver.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23062.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5f94f181ca25d8c5b77beb2da0cb466ddb6ece29
Fixed
eb5ff1025c92117d5d1cc728bcfa294abe484da1
Fixed
eba49c1dee9c5e514ca18e52c545bba524e8a045
Fixed
193922a23d7294085a47d7719fdb7d66ad0a236f
Fixed
25150715e0b049b99df664daf05dab12f41c3e13

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23062.json"