CVE-2022-50236

medium

Description

In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: Fix crash on isr after kexec() If the system is rebooted via isr(), the IRQ handler might be triggered before the domain is initialized. Resulting on an invalid memory access error. Fix: [ 0.500930] Unable to handle kernel read from unreadable memory at virtual address 0000000000000070 [ 0.501166] Call trace: [ 0.501174] report_iommu_fault+0x28/0xfc [ 0.501180] mtk_iommu_isr+0x10c/0x1c0 [ joro: Fixed spelling in commit message ]

References

https://git.kernel.org/stable/c/f13acee780cedb3e06a6dadf64d9104cccd2b9fc

https://git.kernel.org/stable/c/85cc8a187f2de7a91e2cea522e9406fa12999269

https://git.kernel.org/stable/c/00ef8885a945c37551547d8ac8361cacd20c4e42

Details

Source: Mitre, NVD

Published: 2025-09-15

Updated: 2025-09-15

Risk Information

CVSS v2

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00017