Impact
The vulnerability exists in the DRM Imagination driver’s soft reset routine of the Linux kernel. The routine runs from a threaded IRQ handler and mistakenly calls disable_irq(), which waits for IRQ handlers to finish, including itself, leading to a deadlock that stalls kernel execution and effectively renders the system unavailable until reboot.
Affected Systems
Any Linux kernel image that contains the unpatched drm/imagination driver is potentially affected. The reference does not list a specific kernel version range, therefore any kernel built with this code prior to the patch may be vulnerable.
Risk and Exploitability
EPSS is reported as less than 1 %, indicating a low probability of exploitation. The CVE does not appear in the CISA KEV catalog. Because the documentation does not provide an attack vector, it is inferred that an attacker would need the ability to trigger the device’s soft reset routine, which would typically require local privileged or kernel‑level access. The threat is predominantly a denial of service; no indication of confidentiality or integrity compromise is supplied.
OpenCVE Enrichment
Debian DSA