Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Disable MMIO access during SMU Mode 1 reset

During Mode 1 reset, the ASIC undergoes a reset cycle and becomes
temporarily inaccessible via PCIe. Any attempt to access MMIO registers
during this window (e.g., from interrupt handlers or other driver threads)
can result in uncompleted PCIe transactions, leading to NMI panics or
system hangs.

To prevent this, set the `no_hw_access` flag to true immediately after
triggering the reset. This signals other driver components to skip
register accesses while the device is offline.

A memory barrier `smp_mb()` is added to ensure the flag update is
globally visible to all cores before the driver enters the sleep/wait
state.

(cherry picked from commit 7edb503fe4b6d67f47d8bb0dfafb8e699bb0f8a4)
Published: 2026-02-18
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: System hangs or NMI panics from incomplete PCIe transactions during AMD GPU reset
Action: Patch immediately
AI Analysis

Impact

Accessing memory‑mapped I/O registers of an AMD GPU while it is in SMU Mode 1 reset causes uncompleted PCIe transactions that trigger non‑maskable interrupt panics or system freezes. The kernel code fails to block or serialize these accesses during the reset window, resulting in a failure of the device to process requests correctly and destabilising the entire system.

Affected Systems

All Linux kernel builds that include the AMD DRM/PM driver, notably kernel releases 6.19 rc1 through rc4 and earlier unsupported releases until the patch is applied.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1 % reflects a very low expected exploitation probability. The vulnerability is not listed in CISA’s KEV catalog, suggesting limited known exploitation. An attacker with local privileged access can trigger the reset sequence and attempt to read or write MMIO registers during the reset window, causing the device to hang or panic. The exposure is hardware‑local and would require the attacker to invoke the reset, so the attack vector is likely local and privileged rather than remote.

Generated by OpenCVE AI on April 17, 2026 at 18:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a release that contains the commit adding the no_hw_access flag and smp_mb() barrier in drm/amd/pm
  • Ensure that any custom or backported AMD DRM/PM modules are patched to respect the no_hw_access flag during reset cycles
  • If an update is infeasible, configure the system to avoid triggering SMU Mode 1 resets during normal operation, such as disabling unnecessary reset commands in drivers or kernel modules

Generated by OpenCVE AI on April 17, 2026 at 18:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6141-1 linux security update
History

Fri, 17 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1010
CWE-658

Wed, 18 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Fri, 20 Feb 2026 00:15:00 +0000


Wed, 18 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset During Mode 1 reset, the ASIC undergoes a reset cycle and becomes temporarily inaccessible via PCIe. Any attempt to access MMIO registers during this window (e.g., from interrupt handlers or other driver threads) can result in uncompleted PCIe transactions, leading to NMI panics or system hangs. To prevent this, set the `no_hw_access` flag to true immediately after triggering the reset. This signals other driver components to skip register accesses while the device is offline. A memory barrier `smp_mb()` is added to ensure the flag update is globally visible to all cores before the driver enters the sleep/wait state. (cherry picked from commit 7edb503fe4b6d67f47d8bb0dfafb8e699bb0f8a4)
Title drm/amd/pm: Disable MMIO access during SMU Mode 1 reset
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-02-20T11:30:58.183Z

Reserved: 2026-01-13T15:37:45.986Z

Link: CVE-2026-23213

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T15:18:42.600

Modified: 2026-03-18T20:35:21.567

Link: CVE-2026-23213

cve-icon Redhat

Severity :

Publid Date: 2026-02-18T00:00:00Z

Links: CVE-2026-23213 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:45:25Z