CVE-2022-50236

Source
https://cve.org/CVERecord?id=CVE-2022-50236
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50236.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50236
Downstream
Related
Published
2025-09-15T14:01:42.983Z
Modified
2026-04-02T08:28:20.904885Z
Summary
iommu/mediatek: Fix crash on isr after kexec()
Details

In the Linux kernel, the following vulnerability has been resolved:

iommu/mediatek: Fix crash on isr after kexec()

If the system is rebooted via isr(), the IRQ handler might be triggered before the domain is initialized. Resulting on an invalid memory access error.

Fix: [ 0.500930] Unable to handle kernel read from unreadable memory at virtual address 0000000000000070 [ 0.501166] Call trace: [ 0.501174] reportiommufault+0x28/0xfc [ 0.501180] mtkiommuisr+0x10c/0x1c0

[ joro: Fixed spelling in commit message ]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50236.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0df4fabe208d9576f2671d31e77cf46d20fdcd01
Fixed
f13acee780cedb3e06a6dadf64d9104cccd2b9fc
Fixed
85cc8a187f2de7a91e2cea522e9406fa12999269
Fixed
00ef8885a945c37551547d8ac8361cacd20c4e42

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50236.json"