CVE-2026-23470
Deadlock Vulnerability in Linux drm/imagination Soft Reset Sequence
Publication date: 2026-04-03
Last updated on: 2026-04-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's drm/imagination component related to the soft reset sequence.
The issue arises because the soft reset sequence is executed from a threaded IRQ handler, which cannot safely call disable_irq() since disable_irq() waits for IRQ handlers, including itself, to complete, causing a deadlock.
The fix involves using disable_irq_nosync() during the soft reset instead of disable_irq(), preventing the deadlock.
How can this vulnerability impact me? :
This vulnerability can cause a deadlock in the Linux kernel's soft reset sequence for the drm/imagination component.
A deadlock in this context could lead to system instability or a hang during the reset process, potentially affecting system reliability and availability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability involves a deadlock in the Linux kernel's drm/imagination soft reset sequence caused by the use of disable_irq() in a threaded IRQ handler.
To mitigate this vulnerability, update your Linux kernel to a version where this issue is fixed by using disable_irq_nosync() instead of disable_irq() during the soft reset sequence.