CVE-2026-23116 (GCVE-0-2026-23116)

Vulnerability from cvelistv5 – Published: 2026-02-14 15:09 – Updated: 2026-02-14 15:09
VLAI?
Title
pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu
Summary
In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu For i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset and clock enable bits, but is ungated and reset together with the VPUs. So we can't reset G1 or G2 separately, it may led to the system hang. Remove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data. Let imx8mq_vpu_power_notifier() do really vpu reset.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 608d7c325e855cb4a853afef3cd9f0df594bd12d , < 8859e336d233e61a4c40d40dc6a9f21e8b9b719c (git)
Affected: 608d7c325e855cb4a853afef3cd9f0df594bd12d , < cad7003d951e8899db58ee2fef211586af726f09 (git)
Affected: 608d7c325e855cb4a853afef3cd9f0df594bd12d , < 5c56a6f4b5a4f87c094c92a30fa17e28e37ec2ab (git)
Affected: 608d7c325e855cb4a853afef3cd9f0df594bd12d , < fd675de6bddf7e9bdf42ae3929d4c27ba6d1ef76 (git)
Affected: 608d7c325e855cb4a853afef3cd9f0df594bd12d , < 3de49966499634454fd59e0e6fecd50baab7febd (git)
Create a notification for this product.
    Linux Linux Affected: 5.18
Unaffected: 0 , < 5.18 (semver)
Unaffected: 6.1.162 , ≤ 6.1.* (semver)
Unaffected: 6.6.122 , ≤ 6.6.* (semver)
Unaffected: 6.12.68 , ≤ 6.12.* (semver)
Unaffected: 6.18.8 , ≤ 6.18.* (semver)
Unaffected: 6.19 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/pmdomain/imx/imx8m-blk-ctrl.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "8859e336d233e61a4c40d40dc6a9f21e8b9b719c",
              "status": "affected",
              "version": "608d7c325e855cb4a853afef3cd9f0df594bd12d",
              "versionType": "git"
            },
            {
              "lessThan": "cad7003d951e8899db58ee2fef211586af726f09",
              "status": "affected",
              "version": "608d7c325e855cb4a853afef3cd9f0df594bd12d",
              "versionType": "git"
            },
            {
              "lessThan": "5c56a6f4b5a4f87c094c92a30fa17e28e37ec2ab",
              "status": "affected",
              "version": "608d7c325e855cb4a853afef3cd9f0df594bd12d",
              "versionType": "git"
            },
            {
              "lessThan": "fd675de6bddf7e9bdf42ae3929d4c27ba6d1ef76",
              "status": "affected",
              "version": "608d7c325e855cb4a853afef3cd9f0df594bd12d",
              "versionType": "git"
            },
            {
              "lessThan": "3de49966499634454fd59e0e6fecd50baab7febd",
              "status": "affected",
              "version": "608d7c325e855cb4a853afef3cd9f0df594bd12d",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/pmdomain/imx/imx8m-blk-ctrl.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.18"
            },
            {
              "lessThan": "5.18",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.162",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.122",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.68",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.18.*",
              "status": "unaffected",
              "version": "6.18.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.19",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.162",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.122",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.68",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.8",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu\n\nFor i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset\nand clock enable bits, but is ungated and reset together with the VPUs.\nSo we can\u0027t reset G1 or G2 separately, it may led to the system hang.\nRemove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.\nLet imx8mq_vpu_power_notifier() do really vpu reset."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-14T15:09:48.511Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/8859e336d233e61a4c40d40dc6a9f21e8b9b719c"
        },
        {
          "url": "https://git.kernel.org/stable/c/cad7003d951e8899db58ee2fef211586af726f09"
        },
        {
          "url": "https://git.kernel.org/stable/c/5c56a6f4b5a4f87c094c92a30fa17e28e37ec2ab"
        },
        {
          "url": "https://git.kernel.org/stable/c/fd675de6bddf7e9bdf42ae3929d4c27ba6d1ef76"
        },
        {
          "url": "https://git.kernel.org/stable/c/3de49966499634454fd59e0e6fecd50baab7febd"
        }
      ],
      "title": "pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-23116",
    "datePublished": "2026-02-14T15:09:48.511Z",
    "dateReserved": "2026-01-13T15:37:45.969Z",
    "dateUpdated": "2026-02-14T15:09:48.511Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-23116\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-02-14T15:16:06.713\",\"lastModified\":\"2026-02-14T15:16:06.713\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\npmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu\\n\\nFor i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset\\nand clock enable bits, but is ungated and reset together with the VPUs.\\nSo we can\u0027t reset G1 or G2 separately, it may led to the system hang.\\nRemove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.\\nLet imx8mq_vpu_power_notifier() do really vpu reset.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3de49966499634454fd59e0e6fecd50baab7febd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5c56a6f4b5a4f87c094c92a30fa17e28e37ec2ab\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8859e336d233e61a4c40d40dc6a9f21e8b9b719c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cad7003d951e8899db58ee2fef211586af726f09\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fd675de6bddf7e9bdf42ae3929d4c27ba6d1ef76\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…