CVE-2026-23116 (GCVE-0-2026-23116)
Vulnerability from cvelistv5 – Published: 2026-02-14 15:09 – Updated: 2026-02-14 15:09
VLAI?
Title
pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu
Summary
In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu
For i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset
and clock enable bits, but is ungated and reset together with the VPUs.
So we can't reset G1 or G2 separately, it may led to the system hang.
Remove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.
Let imx8mq_vpu_power_notifier() do really vpu reset.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
608d7c325e855cb4a853afef3cd9f0df594bd12d , < 8859e336d233e61a4c40d40dc6a9f21e8b9b719c
(git)
Affected: 608d7c325e855cb4a853afef3cd9f0df594bd12d , < cad7003d951e8899db58ee2fef211586af726f09 (git) Affected: 608d7c325e855cb4a853afef3cd9f0df594bd12d , < 5c56a6f4b5a4f87c094c92a30fa17e28e37ec2ab (git) Affected: 608d7c325e855cb4a853afef3cd9f0df594bd12d , < fd675de6bddf7e9bdf42ae3929d4c27ba6d1ef76 (git) Affected: 608d7c325e855cb4a853afef3cd9f0df594bd12d , < 3de49966499634454fd59e0e6fecd50baab7febd (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/pmdomain/imx/imx8m-blk-ctrl.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "8859e336d233e61a4c40d40dc6a9f21e8b9b719c",
"status": "affected",
"version": "608d7c325e855cb4a853afef3cd9f0df594bd12d",
"versionType": "git"
},
{
"lessThan": "cad7003d951e8899db58ee2fef211586af726f09",
"status": "affected",
"version": "608d7c325e855cb4a853afef3cd9f0df594bd12d",
"versionType": "git"
},
{
"lessThan": "5c56a6f4b5a4f87c094c92a30fa17e28e37ec2ab",
"status": "affected",
"version": "608d7c325e855cb4a853afef3cd9f0df594bd12d",
"versionType": "git"
},
{
"lessThan": "fd675de6bddf7e9bdf42ae3929d4c27ba6d1ef76",
"status": "affected",
"version": "608d7c325e855cb4a853afef3cd9f0df594bd12d",
"versionType": "git"
},
{
"lessThan": "3de49966499634454fd59e0e6fecd50baab7febd",
"status": "affected",
"version": "608d7c325e855cb4a853afef3cd9f0df594bd12d",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/pmdomain/imx/imx8m-blk-ctrl.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.18"
},
{
"lessThan": "5.18",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.162",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.122",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.68",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.8",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.19",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.162",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.122",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.68",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.8",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19",
"versionStartIncluding": "5.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu\n\nFor i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset\nand clock enable bits, but is ungated and reset together with the VPUs.\nSo we can\u0027t reset G1 or G2 separately, it may led to the system hang.\nRemove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.\nLet imx8mq_vpu_power_notifier() do really vpu reset."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-14T15:09:48.511Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/8859e336d233e61a4c40d40dc6a9f21e8b9b719c"
},
{
"url": "https://git.kernel.org/stable/c/cad7003d951e8899db58ee2fef211586af726f09"
},
{
"url": "https://git.kernel.org/stable/c/5c56a6f4b5a4f87c094c92a30fa17e28e37ec2ab"
},
{
"url": "https://git.kernel.org/stable/c/fd675de6bddf7e9bdf42ae3929d4c27ba6d1ef76"
},
{
"url": "https://git.kernel.org/stable/c/3de49966499634454fd59e0e6fecd50baab7febd"
}
],
"title": "pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-23116",
"datePublished": "2026-02-14T15:09:48.511Z",
"dateReserved": "2026-01-13T15:37:45.969Z",
"dateUpdated": "2026-02-14T15:09:48.511Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23116\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-02-14T15:16:06.713\",\"lastModified\":\"2026-02-18T17:52:44.520\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\npmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu\\n\\nFor i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset\\nand clock enable bits, but is ungated and reset together with the VPUs.\\nSo we can\u0027t reset G1 or G2 separately, it may led to the system hang.\\nRemove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.\\nLet imx8mq_vpu_power_notifier() do really vpu reset.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\\n\\npmdomain: imx8m-blk-ctrl: Eliminar m\u00e1scara separada de rst y clk para vpu 8mq\\n\\nPara la plataforma i.MX8MQ, el ADB en el dominio VPUMIX no tiene bits separados de reinicio y habilitaci\u00f3n de reloj, sino que se desactiva y reinicia junto con las VPUs. Por lo tanto, no podemos reiniciar G1 o G2 por separado, podr\u00eda llevar a la congelaci\u00f3n del sistema. Eliminar rst_mask y clk_mask de imx8mq_vpu_blk_ctl_domain_data. Dejar que imx8mq_vpu_power_notifier() realice realmente el reinicio de la vpu.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3de49966499634454fd59e0e6fecd50baab7febd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5c56a6f4b5a4f87c094c92a30fa17e28e37ec2ab\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8859e336d233e61a4c40d40dc6a9f21e8b9b719c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cad7003d951e8899db58ee2fef211586af726f09\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fd675de6bddf7e9bdf42ae3929d4c27ba6d1ef76\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…