CVE-2026-23264

medium

Description

In the Linux kernel, the following vulnerability has been resolved: Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem" This reverts commit 7294863a6f01248d72b61d38478978d638641bee. This commit was erroneously applied again after commit 0ab5d711ec74 ("drm/amd: Refactor `amdgpu_aspm` to be evaluated per device") removed it, leading to very hard to debug crashes, when used with a system with two AMD GPUs of which only one supports ASPM. (cherry picked from commit 97a9689300eb2b393ba5efc17c8e5db835917080)

References

https://git.kernel.org/stable/c/f02c9052aaa031ef3c2285d86a155d4263180ddd

https://git.kernel.org/stable/c/d2bddc2da2b3ba5d738877c476bf97932dba32e8

https://git.kernel.org/stable/c/5f645222eb30c91135119e12eccfd1b8ea88140e

https://git.kernel.org/stable/c/5b794951541e84d2968980a68dd1ac38420f75f3

https://git.kernel.org/stable/c/243b467dea1735fed904c2e54d248a46fa417a2d

Details

Source: Mitre, NVD

Published: 2026-03-18

Updated: 2026-03-19

Risk Information

CVSS v2

Base Score: 6.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018