CVE-2026-23213

8 documents8 sources
Severity
5.5MEDIUM
EPSS
0.0%
top 96.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 18

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset During Mode 1 reset, the ASIC undergoes a reset cycle and becomes temporarily inaccessible via PCIe. Any attempt to access MMIO registers during this window (e.g., from interrupt handlers or other driver threads) can result in uncompleted PCIe transactions, leading to NMI panics or system hangs. To prevent this, set the `no_hw_access` flag to true immediately after trigg

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel5.96.12.70+2
CVEListV5linux/linuxea8139d8d59bd6f014b317e7423345169a56fe49c1853ebbec980d5c05d431bfd6ded73b1363fd00+3
Debianlinux< 6.12.73-1+1

Patches

🔴Vulnerability Details

3
OSV
CVE-2026-23213: In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset During Mode 1 reset, the A2026-02-18
GHSA
GHSA-h85r-3jrw-9546: In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset During Mode 1 reset, the2026-02-18
CVEList
drm/amd/pm: Disable MMIO access during SMU Mode 1 reset2026-02-18

📋Vendor Advisories

3
Red Hat
kernel: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset2026-02-18
Microsoft
drm/amd/pm: Disable MMIO access during SMU Mode 1 reset2026-02-10
Debian
CVE-2026-23213: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm:...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23213 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23213 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io