CVE-2026-23264Linux vulnerability

8 documents7 sources
Severity
5.3MEDIUM
No vector
EPSS
0.0%
top 93.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 18

Description

In the Linux kernel, the following vulnerability has been resolved: Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem" This reverts commit 7294863a6f01248d72b61d38478978d638641bee. This commit was erroneously applied again after commit 0ab5d711ec74 ("drm/amd: Refactor `amdgpu_aspm` to be evaluated per device") removed it, leading to very hard to debug crashes, when used with a system with two AMD GPUs of which only one supports ASPM. (cherry picked from commit 97a9689300eb2b393ba

Affected Packages3 packages

Linuxlinux/linux_kernel5.18.06.1.163+3
Debianlinux/linux_kernel< 6.1.164-1+2
CVEListV5linux/linux0ab5d711ec74d9e60673900974806b7688857947f02c9052aaa031ef3c2285d86a155d4263180ddd+6

🔴Vulnerability Details

4
GHSA
GHSA-pqp4-5r3j-578m: In the Linux kernel, the following vulnerability has been resolved: Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem" This reverts comm2026-03-18
OSV
Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem"2026-03-18
CVEList
Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem"2026-03-18
OSV
CVE-2026-23264: In the Linux kernel, the following vulnerability has been resolved: Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem" This reverts commit2026-03-18

📋Vendor Advisories

2
Red Hat
kernel: Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem"2026-03-18
Debian
CVE-2026-23264: linux - In the Linux kernel, the following vulnerability has been resolved: Revert "drm...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23264 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23264 — Linux vulnerability | cvebase