CVE-2026-23264
Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem"
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem" This reverts commit 7294863a6f01248d72b61d38478978d638641bee. This commit was erroneously applied again after commit 0ab5d711ec74 ("drm/amd: Refactor `amdgpu_aspm` to be evaluated per device") removed it, leading to very hard to debug crashes, when used with a system with two AMD GPUs of which only one supports ASPM. (cherry picked from commit 97a9689300eb2b393ba5efc17c8e5db835917080)
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Mar 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
0ab5d711ec74d9e60673900974806b7688857947 < f02c9052aaa031ef3c2285d86a155d4263180ddd 0ab5d711ec74d9e60673900974806b7688857947 < d2bddc2da2b3ba5d738877c476bf97932dba32e8 0ab5d711ec74d9e60673900974806b7688857947 < 5b794951541e84d2968980a68dd1ac38420f75f3 0ab5d711ec74d9e60673900974806b7688857947 < 5f645222eb30c91135119e12eccfd1b8ea88140e 0ab5d711ec74d9e60673900974806b7688857947 < 243b467dea1735fed904c2e54d248a46fa417a2d 0a9a60dcedaacde4b903337b7445cb431b4dd119
Linux / Linux
5.18
References
git.kernel.org: https://git.kernel.org/stable/c/f02c9052aaa031ef3c2285d86a155d4263180ddd git.kernel.org: https://git.kernel.org/stable/c/d2bddc2da2b3ba5d738877c476bf97932dba32e8 git.kernel.org: https://git.kernel.org/stable/c/5b794951541e84d2968980a68dd1ac38420f75f3 git.kernel.org: https://git.kernel.org/stable/c/5f645222eb30c91135119e12eccfd1b8ea88140e git.kernel.org: https://git.kernel.org/stable/c/243b467dea1735fed904c2e54d248a46fa417a2d