{"id":"CVE-2026-23264","summary":"Revert \"drm/amd: Check if ASPM is enabled from PCIe subsystem\"","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"drm/amd: Check if ASPM is enabled from PCIe subsystem\"\n\nThis reverts commit 7294863a6f01248d72b61d38478978d638641bee.\n\nThis commit was erroneously applied again after commit 0ab5d711ec74\n(\"drm/amd: Refactor `amdgpu_aspm` to be evaluated per device\")\nremoved it, leading to very hard to debug crashes, when used with a system with two\nAMD GPUs of which only one supports ASPM.\n\n(cherry picked from commit 97a9689300eb2b393ba5efc17c8e5db835917080)","modified":"2026-03-20T12:47:28.838085Z","published":"2026-03-18T17:41:10.208Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23264.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/243b467dea1735fed904c2e54d248a46fa417a2d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5b794951541e84d2968980a68dd1ac38420f75f3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5f645222eb30c91135119e12eccfd1b8ea88140e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d2bddc2da2b3ba5d738877c476bf97932dba32e8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f02c9052aaa031ef3c2285d86a155d4263180ddd"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23264.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23264"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0ab5d711ec74d9e60673900974806b7688857947"},{"fixed":"f02c9052aaa031ef3c2285d86a155d4263180ddd"},{"fixed":"d2bddc2da2b3ba5d738877c476bf97932dba32e8"},{"fixed":"5b794951541e84d2968980a68dd1ac38420f75f3"},{"fixed":"5f645222eb30c91135119e12eccfd1b8ea88140e"},{"fixed":"243b467dea1735fed904c2e54d248a46fa417a2d"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"0a9a60dcedaacde4b903337b7445cb431b4dd119"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23264.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.18.0"},{"fixed":"6.1.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.124"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.70"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23264.json"}}],"schema_version":"1.7.5"}