Impact
Accessing memory‑mapped I/O registers of an AMD GPU while it is in SMU Mode 1 reset causes uncompleted PCIe transactions that trigger non‑maskable interrupt panics or system freezes. The kernel code fails to block or serialize these accesses during the reset window, resulting in a failure of the device to process requests correctly and destabilising the entire system.
Affected Systems
All Linux kernel builds that include the AMD DRM/PM driver, notably kernel releases 6.19 rc1 through rc4 and earlier unsupported releases until the patch is applied.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1 % reflects a very low expected exploitation probability. The vulnerability is not listed in CISA’s KEV catalog, suggesting limited known exploitation. An attacker with local privileged access can trigger the reset sequence and attempt to read or write MMIO registers during the reset window, causing the device to hang or panic. The exposure is hardware‑local and would require the attacker to invoke the reset, so the attack vector is likely local and privileged rather than remote.
OpenCVE Enrichment
Debian DSA