CVE-2022-50236

EUVD-2022-55514
In the Linux kernel, the following vulnerability has been resolved:

iommu/mediatek: Fix crash on isr after kexec()

If the system is rebooted via isr(), the IRQ handler might
be triggered before the domain is initialized. Resulting on
an invalid memory access error.

Fix:
[    0.500930] Unable to handle kernel read from unreadable memory at virtual address 0000000000000070
[    0.501166] Call trace:
[    0.501174]  report_iommu_fault+0x28/0xfc
[    0.501180]  mtk_iommu_isr+0x10c/0x1c0

[ joro: Fixed spelling in commit message ]
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
4.6 ≤
𝑥
< 6.0.17
linuxlinux_kernel
6.1 ≤
𝑥
< 6.1.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.148-1
fixed
bookworm (security)
6.1.147-1
fixed
bullseye
vulnerable
bullseye (security)
vulnerable
forky
6.16.3-1
fixed
sid
6.16.7-1
fixed
trixie
6.12.43-1
fixed
trixie (security)
6.12.41-1
fixed
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
cluster-md-kmp-default
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
dlm-kmp-default
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
gfs2-kmp-default
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
kernel-default
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
kernel-default-base
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
kernel-default-man
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
kernel-macros
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
kernel-source
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
kernel-syms
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed
ocfs2-kmp-default
suse enterprise server 12 SP5
4.12.14-122.280.1
fixed