Impact
In the Linux kernel DRM driver for Renesas RZ/G2L boards, a reboot that triggers panels requiring MIPI‑DSI commands in their unprepare() routine can cause the kernel to panic. The panic occurs when the existing stop sequence is invoked prematurely, leading the driver to attempt a data transfer on a stopped interface. The crash results in an OS halt that requires a hard reset, effectively denying service to the affected machine.
Affected Systems
Linux kernel builds that include the renesas DRM driver on Renesas RZ/G2L hardware, particularly when a connected panel performs MIPI‑DSI communication during its unprepare() callback. The issue exists in kernel versions that contain commit 56de5e305d4b and earlier; it has been fixed in later revisions of the driver. No specific kernel release notation is provided in the advisory.
Risk and Exploitability
The flaw manifests during system shutdown or reboot, which normally requires local privileged access; no evidence indicates remote exploitation is possible. EPSS information is not available and the vulnerability is not listed in CISA KEV. The risk is operational: a system crash that interrupts service and requires manual recovery. The CVSS score is not disclosed, so the exploitation likelihood cannot be quantified precisely, but the lack of public exploitation data suggests a low to moderate practical risk. The primary attack vector is a local privileged reboot trigger.
OpenCVE Enrichment