CVE-2022-50236
iommu/mediatek: Fix crash on isr after kexec()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: Fix crash on isr after kexec() If the system is rebooted via isr(), the IRQ handler might be triggered before the domain is initialized. Resulting on an invalid memory access error. Fix: [ 0.500930] Unable to handle kernel read from unreadable memory at virtual address 0000000000000070 [ 0.501166] Call trace: [ 0.501174] report_iommu_fault+0x28/0xfc [ 0.501180] mtk_iommu_isr+0x10c/0x1c0 [ joro: Fixed spelling in commit message ]
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Sep 15, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
0df4fabe208d9576f2671d31e77cf46d20fdcd01 < f13acee780cedb3e06a6dadf64d9104cccd2b9fc 0df4fabe208d9576f2671d31e77cf46d20fdcd01 < 85cc8a187f2de7a91e2cea522e9406fa12999269 0df4fabe208d9576f2671d31e77cf46d20fdcd01 < 00ef8885a945c37551547d8ac8361cacd20c4e42
Linux / Linux
4.6