CVE-2026-23062

Source
https://cve.org/CVERecord?id=CVE-2026-23062
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23062.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23062
Downstream
Related
Published
2026-02-04T16:07:44.420Z
Modified
2026-05-07T04:17:47.628054Z
Summary
platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro
Details

In the Linux kernel, the following vulnerability has been resolved:

platform/x86: hp-bioscfg: Fix kernel panic in GETINSTANCEID macro

The GETINSTANCEID macro that caused a kernel panic when accessing sysfs attributes:

  1. Off-by-one error: The loop condition used '<=' instead of '<', causing access beyond array bounds. Since array indices are 0-based and go from 0 to instances_count-1, the loop should use '<'.

  2. Missing NULL check: The code dereferenced attrnamekobj->name without checking if attrnamekobj was NULL, causing a null pointer dereference in minlengthshow() and other attribute show functions.

The panic occurred when fwupd tried to read BIOS configuration attributes:

Oops: general protection fault [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] RIP: 0010:minlengthshow+0xcf/0x1d0 [hp_bioscfg]

Add a NULL check for attrnamekobj before dereferencing and corrects the loop boundary to match the pattern used elsewhere in the driver.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23062.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5f94f181ca25d8c5b77beb2da0cb466ddb6ece29
Fixed
eb5ff1025c92117d5d1cc728bcfa294abe484da1
Fixed
eba49c1dee9c5e514ca18e52c545bba524e8a045
Fixed
193922a23d7294085a47d7719fdb7d66ad0a236f
Fixed
25150715e0b049b99df664daf05dab12f41c3e13

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23062.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.122
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.68
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23062.json"