In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix error handling in slot reset
If the device has not recovered after slot reset is called, it goes to
out label for error handling. There it could make decision based on
uninitialized hive pointer and could result in accessing an uninitialized
list.
Initialize the list and hive properly so that it handles the error
situation and also releases the reset domain lock which is acquired
during error_detected callback.
(cherry picked from commit bb71362182e59caa227e4192da5a612b09349696)
CVE-2026-23358
NONE
EPSS 0.02%
Updated Mar 25, 2026
Linux
https://git.kernel.org/stable/c/73e8bdf14248136459753252a438177df7ed8c7c
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/b57c4ec98c17789136a4db948aec6daadceb5024
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/baf4e7968911635eb816870af0ea587ac1457052
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVE Details
CVE ID
CVE-2026-23358
Published Date
Mar 25, 2026
Vendor
Linux
Severity
NONE
Exploit Prediction (EPSS)
Probability of Exploit
0.02%
Likelihood of exploitation in next 30 days
Percentile:
5.8th percentile (higher than 5.8% of all CVEs)
Standard patching cycle
Impact
Minimal impact
Source
View Advisory