SB2026032084 - Type conversion in Linux kernel amd amdgpu driver



SB2026032084 - Type conversion in Linux kernel amd amdgpu driver

Published: March 20, 2026

Security Bulletin ID SB2026032084
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Type conversion (CVE-ID: CVE-2026-23264)

The vulnerability allows a local user to cause a denial of service, escalate privileges, or execute arbitrary code.

The vulnerability exists due to improper logic in the DRM/AMD GPU driver when handling PCIe ASPM (Active State Power Management) configuration for multi-GPU systems. A local user can trigger incorrect ASPM state evaluation on a system with multiple AMD GPUs where only one supports ASPM, leading to system crashes or instability that may be exploited to escalate privileges or execute arbitrary code.

The vulnerability specifically affects systems with two AMD GPUs where only one supports ASPM, and the flaw arises from reintroducing a previously reverted commit that did not account for per-device ASPM evaluation.


Remediation

Install update from vendor's website.